Attention: please enable javascript in order to properly view and use this malware analysis service.

Incident Response

Risk Assessment

Evasive
Marks file for deletion

MITRE ATT&CK™ Techniques Detection

This report has 5 indicators that were mapped to 7 attack techniques and 5 tactics. View all details

Indicators

Not all malicious and suspicious indicators are displayed. Get your own cloud service or the full version to view all details.

  • Malicious Indicators 5

  • External Systems
  • General
  • Pattern Matching
    • YARA signature match
      details
      YARA signature "CN_Honker_Acunetix_Web_Vulnerability_Scanner_8_x_Enterprise_Edition_KeyGen" matched file "1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin" as "Sample from CN Honker Pentest Toolset - file Acunetix_Web_Vulnerability_Scanner_8.x_Enterprise_Edition_KeyGen.exe" based on indicators: "<description>Patch</description>,\dup2patcher.dll,load_patcher" (Reference: Disclosed CN Honker Pentest Toolset, Author: Florian Roth)
      YARA signature "CN_Honker_Acunetix_Web_Vulnerability_Scanner_8_x_Enterprise_Edition_KeyGen" matched file "all.bstring" as "Sample from CN Honker Pentest Toolset - file Acunetix_Web_Vulnerability_Scanner_8.x_Enterprise_Edition_KeyGen.exe" based on indicators: "<description>Patch</description>,\dup2patcher.dll,load_patcher" (Reference: Disclosed CN Honker Pentest Toolset, Author: Florian Roth)
      source
      YARA Signature
      relevance
      10/10
  • Hiding 1 Malicious Indicators
    • All indicators are available only in the private webservice or standalone version
  • Suspicious Indicators 8

  • Anti-Reverse Engineering
  • Installation/Persistence
    • Drops executable files
      details
      "dup2patcher.dll" has type "PE32 executable (DLL) (GUI) Intel 80386 for MS Windows"
      source
      Binary File
      relevance
      10/10
  • System Destruction
  • Unusual Characteristics
    • CRC value set in PE header does not match actual value
      details
      "1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin" claimed CRC 60637 while the actual is CRC 132893
      "dup2patcher.dll" claimed CRC 104727 while the actual is CRC 74355
      source
      Static Parser
      relevance
      10/10
    • Imports suspicious APIs
      details
      GetTempPathA
      GetModuleHandleA
      DeleteFileA
      WriteFile
      CreateFileA
      GetProcAddress
      FindResourceA
      VirtualAlloc
      LoadLibraryA
      RegCloseKey
      RegDeleteValueA
      RegCreateKeyExA
      RegOpenKeyExA
      GetFileAttributesA
      CopyFileA
      GetVersionExA
      GetModuleFileNameA
      GetFileSize
      CreateDirectoryA
      GetCommandLineA
      CreateThread
      MapViewOfFile
      FindFirstFileA
      CreateFileMappingA
      CreateProcessA
      Sleep
      ShellExecuteExA
      ShellExecuteA
      GetCursorPos
      source
      Static Parser
      relevance
      1/10
    • Installs hooks/patches the running process
      details
      "VueScanx32v9.7.50_Patcherv1.2.exe" wrote bytes "c04ed0772054d177e065d177b538d2770000000000d0bc7600000000c5eabc760000000088eabc7600000000e968c2758228d277ee29d27700000000d269c275000000007dbbbc760000000009bec27500000000ba18bc7600000000" to virtual address "0x77E31000" (part of module "NSI.DLL")
      "VueScanx32v9.7.50_Patcherv1.2.exe" wrote bytes "f811a675" to virtual address "0x75A783C4" (part of module "SSPICLI.DLL")
      "VueScanx32v9.7.50_Patcherv1.2.exe" wrote bytes "4812a675" to virtual address "0x75A78364" (part of module "SSPICLI.DLL")
      "VueScanx32v9.7.50_Patcherv1.2.exe" wrote bytes "4812a675" to virtual address "0x75A783C0" (part of module "SSPICLI.DLL")
      "VueScanx32v9.7.50_Patcherv1.2.exe" wrote bytes "f811a675" to virtual address "0x75A783E0" (part of module "SSPICLI.DLL")
      "VueScanx32v9.7.50_Patcherv1.2.exe" wrote bytes "f8110000" to virtual address "0x75A612CC" (part of module "SSPICLI.DLL")
      "VueScanx32v9.7.50_Patcherv1.2.exe" wrote bytes "da45bc7652bebd76cda6bc7687f1bc7613dbbc76bccebc76c483be7685debc76ca9ebc766058d0774557bc765ac6bc7681a8bc7688eabc7681ecbc763f87bb761656bd7600000000" to virtual address "0x00EB2000" (part of module "VUESCANX32V9.7.50_PATCHERV1.2.EXE")
      "VueScanx32v9.7.50_Patcherv1.2.exe" wrote bytes "f811a675" to virtual address "0x75A7834C" (part of module "SSPICLI.DLL")
      "VueScanx32v9.7.50_Patcherv1.2.exe" wrote bytes "f8110000" to virtual address "0x75A61408" (part of module "SSPICLI.DLL")
      "VueScanx32v9.7.50_Patcherv1.2.exe" wrote bytes "b890121170ffe0" to virtual address "0x75A61248" (part of module "SSPICLI.DLL")
      "VueScanx32v9.7.50_Patcherv1.2.exe" wrote bytes "4812a675" to virtual address "0x75A78348" (part of module "SSPICLI.DLL")
      "VueScanx32v9.7.50_Patcherv1.2.exe" wrote bytes "f811a675" to virtual address "0x75A78368" (part of module "SSPICLI.DLL")
      "VueScanx32v9.7.50_Patcherv1.2.exe" wrote bytes "b880111170ffe0" to virtual address "0x76F91368" (part of module "WS2_32.DLL")
      "VueScanx32v9.7.50_Patcherv1.2.exe" wrote bytes "68130000" to virtual address "0x76F91680" (part of module "WS2_32.DLL")
      "VueScanx32v9.7.50_Patcherv1.2.exe" wrote bytes "48120000" to virtual address "0x75A6139C" (part of module "SSPICLI.DLL")
      "VueScanx32v9.7.50_Patcherv1.2.exe" wrote bytes "48120000" to virtual address "0x75A612DC" (part of module "SSPICLI.DLL")
      "VueScanx32v9.7.50_Patcherv1.2.exe" wrote bytes "4812a675" to virtual address "0x75A783DC" (part of module "SSPICLI.DLL")
      "VueScanx32v9.7.50_Patcherv1.2.exe" wrote bytes "b810151170ffe0" to virtual address "0x75A611F8" (part of module "SSPICLI.DLL")
      source
      Hook Detection
      relevance
      10/10
      ATT&CK ID
      T1179 (Show technique in the MITRE ATT&CK™ matrix)
    • Reads information about supported languages
      details
      "VueScanx32v9.7.50_Patcherv1.2.exe" (Path: "HKLM\SYSTEM\CONTROLSET001\CONTROL\NLS\LOCALE"; Key: "00000409")
      source
      Registry Access
      relevance
      3/10
      ATT&CK ID
      T1012 (Show technique in the MITRE ATT&CK™ matrix)

File Details

All Details:

VueScan x32 v9.7.50+ Patcher v1.2.exe

Filename
VueScan x32 v9.7.50+ Patcher v1.2.exe
Size
78KiB (79872 bytes)
Type
peexe executable
Description
PE32 executable (GUI) Intel 80386, for MS Windows
Architecture
WINDOWS
SHA256
1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defcCopy SHA256 to clipboard
Compiler/Packer
Safeguard v1.03 -> Simonzh

Resources

Language
NEUTRAL
Icon
Sample Icon

Visualization

Input File (PortEx)
PE Visualization

Classification (TrID)

  • 61.7% (.EXE) Win64 Executable (generic)
  • 14.7% (.DLL) Win32 Dynamic Link Library (generic)
  • 10.0% (.EXE) Win32 Executable (generic)
  • 4.5% (.EXE) OS/2 Executable (generic)
  • 4.4% (.EXE) Generic Win/DOS Executable

File Metadata


  • 1 .OBJ Files (COFF) linked with LINK.EXE 10.10 (Visual Studio 2010) (build: 30319)
  • 1 .RES Files linked with CVTRES.EXE 10.00 (Visual Studio 2010) (build: 30319)
  • 1 .ASM Files assembled with MASM 10.00 (Visual Studio 2010) (build: 30319)
  • 3 .LIB Files generated with LIB.EXE 10.00 (Visual Studio 2010) (build: 30319)
  • 1 .ASM Files assembled with MASM 6.14 (Visual Studio 6 SP2) (build: 8444)
  • File contains assembly code
  • File appears to contain raw COFF/OMF content
  • File is the product of a small codebase (1 files)

File Sections

File Resources

File Imports

CloseHandle
CreateFileA
DeleteFileA
ExitProcess
FindResourceA
FlushFileBuffers
FreeLibrary
GetModuleHandleA
GetProcAddress
GetTempPathA
LoadLibraryA
LoadResource
lstrcatA
RtlMoveMemory
SizeofResource
VirtualAlloc
WriteFile

Screenshots

Loading content, please wait...

Hybrid Analysis

Tip: Click an analysed process below to view more details.

Analysed 1 process in total (System Resource Monitor).

Network Analysis

DNS Requests

No relevant DNS requests were made.

Contacted Hosts

No relevant hosts were contacted.

HTTP Traffic

No relevant HTTP requests were made.

Extracted Strings

All Details:
!This program cannot be run in DOS mode.$
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
&F9n;(<=t
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
/>&9(>"3)
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
/help : show help menu
Ansi based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
00060101.00060101
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
0______D9
Ansi based on Image Processing (screen_2.png)
0hI8keB8ckup,
Ansi based on Image Processing (screen_2.png)
181>1D1J1P1V1\1b1h1n1t1z1
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
3m&OpHhcT
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"> <assemblyIdentity version="2.0.0.0" processorArchitecture="X86" name="Patch" type="win32" /> <description>Patch</description> <dependency> <dependentAssembly> <assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="X86" publicKeyToken="6595b64144ccf1df" language="*" /> </dependentAssembly> </dependency> <trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"> <security> <requestedPrivileges> <requestedExecutionLevel level="requireAdministrator" uiAccess="false" /> </requestedPrivileges> </security> </trustInfo></assembly>PAPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPAD
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
?__;?,___gq_,9,
Ansi based on Image Processing (screen_0.png)
\dup2patcher.dll
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
\Sessions\1\Windows\ApiPort
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
\ThemeApiPort
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
_?__?_?v?______
Ansi based on Image Processing (screen_0.png)
__0____q__
Ansi based on Image Processing (screen_2.png)
___________
Ansi based on Image Processing (screen_2.png)
______q0_____
Ansi based on Image Processing (screen_2.png)
_A_n8teVueSc8n
Ansi based on Image Processing (screen_2.png)
_F_len8me_
Ansi based on Image Processing (screen_2.png)
`hv&9(5kJ
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
C@=5ZVRWYUSkDA>xkea
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
Cl0seVueSc8n
Ansi based on Image Processing (screen_2.png)
CloseHandle
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
Com+Enabled
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
CompatDll
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
CreateFileA
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
CWDIllegalInDLLSearch
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
DataFilePath
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
DeleteFileA
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
DINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPAD
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
DisableMetaFiles
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
DisableUserModeCallbackFilter
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
EnableAnchorContext
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
ExitProcess
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
FindResourceA
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
FlushFileBuffers
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
FreeLibrary
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
GetModuleHandleA
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
GetProcAddress
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
GetTempPathA
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
h_8__y1___0_1
Ansi based on Image Processing (screen_2.png)
Inst8lIVueSc8n
Ansi based on Image Processing (screen_2.png)
kernel32.dll
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
Language Hotkey
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
Layout Hotkey
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
load_patcher
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
LoadAppInit_DLLs
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
LoadLibraryA
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
LoadResource
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
MachinePreferredUILanguages
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
MaxSxSHashCount
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
PageAllocatorSystemHeapIsPrivate
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
PageAllocatorUseSystemHeap
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
PreferExternalManifest
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
PreferredUILanguages
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
RtlMoveMemory
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
SafeDllSearchMode
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
SizeofResource
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
ThemeApiConnectionRequest
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
TransparentEnabled
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
TurnOffSPIAnimations
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
VirtualAlloc
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
vuescan_av9.7S0+_atcherv1_
Ansi based on Image Processing (screen_2.png)
WriteFile
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"> <assemblyIdentity version="2.0.0.0" processorArchitecture="X86" name="Patch" type="win32" /> <description>Patch</description> <dependency> <dependentAssembly> <assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="X86" publicKeyToken="6595b64144ccf1df" language="*" /> </dependentAssembly> </dependency> <trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"> <security> <requestedPrivileges> <requestedExecutionLevel level="requireAdministrator" uiAccess="false" /> </requestedPrivileges> </security> </trustInfo></assembly>PAPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPAD
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
\Sessions\1\Windows\ApiPort
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
\ThemeApiPort
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
Com+Enabled
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
CompatDll
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
DINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPAD
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
ExitProcess
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
GetModuleHandleA
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
GetProcAddress
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
GetTempPathA
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
Inst8lIVueSc8n
Ansi based on Image Processing (screen_2.png)
Language Hotkey
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
Layout Hotkey
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
ThemeApiConnectionRequest
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
vuescan_av9.7S0+_atcherv1_
Ansi based on Image Processing (screen_2.png)
!This program cannot be run in DOS mode.$
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
&F9n;(<=t
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
/>&9(>"3)
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
181>1D1J1P1V1\1b1h1n1t1z1
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
3m&OpHhcT
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
<?xml version="1.0" encoding="UTF-8" standalone="yes"?><assembly xmlns="urn:schemas-microsoft-com:asm.v1" manifestVersion="1.0"> <assemblyIdentity version="2.0.0.0" processorArchitecture="X86" name="Patch" type="win32" /> <description>Patch</description> <dependency> <dependentAssembly> <assemblyIdentity type="win32" name="Microsoft.Windows.Common-Controls" version="6.0.0.0" processorArchitecture="X86" publicKeyToken="6595b64144ccf1df" language="*" /> </dependentAssembly> </dependency> <trustInfo xmlns="urn:schemas-microsoft-com:asm.v3"> <security> <requestedPrivileges> <requestedExecutionLevel level="requireAdministrator" uiAccess="false" /> </requestedPrivileges> </security> </trustInfo></assembly>PAPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPAD
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
\dup2patcher.dll
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
`hv&9(5kJ
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
C@=5ZVRWYUSkDA>xkea
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
CloseHandle
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
CreateFileA
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
DeleteFileA
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
DINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPADDINGPADDINGXXPAD
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
ExitProcess
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
FindResourceA
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
FlushFileBuffers
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
FreeLibrary
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
GetModuleHandleA
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
GetProcAddress
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
GetTempPathA
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
kernel32.dll
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
load_patcher
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
LoadLibraryA
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
LoadResource
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
RtlMoveMemory
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
SizeofResource
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
VirtualAlloc
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
WriteFile
Ansi based on Memory/File Scan (1b546a7546f8185cddd5a788554cb8a9ac968345c3580c22315b59552d90defc.bin)
/help : show help menu
Ansi based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
00060101.00060101
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
\Sessions\1\Windows\ApiPort
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
\ThemeApiPort
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
Com+Enabled
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
CompatDll
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
CWDIllegalInDLLSearch
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
DataFilePath
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
DisableMetaFiles
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
DisableUserModeCallbackFilter
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
EnableAnchorContext
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
Language Hotkey
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
Layout Hotkey
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
LoadAppInit_DLLs
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
MachinePreferredUILanguages
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
MaxSxSHashCount
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
PageAllocatorSystemHeapIsPrivate
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
PageAllocatorUseSystemHeap
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
PreferExternalManifest
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
PreferredUILanguages
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
SafeDllSearchMode
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
ThemeApiConnectionRequest
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
TransparentEnabled
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
TurnOffSPIAnimations
Unicode based on Runtime Data (VueScanx32v9.7.50_Patcherv1.2.exe )
0______D9
Ansi based on Image Processing (screen_2.png)
0hI8keB8ckup,
Ansi based on Image Processing (screen_2.png)
__0____q__
Ansi based on Image Processing (screen_2.png)
___________
Ansi based on Image Processing (screen_2.png)
______q0_____
Ansi based on Image Processing (screen_2.png)
_A_n8teVueSc8n
Ansi based on Image Processing (screen_2.png)
_F_len8me_
Ansi based on Image Processing (screen_2.png)
Cl0seVueSc8n
Ansi based on Image Processing (screen_2.png)
h_8__y1___0_1
Ansi based on Image Processing (screen_2.png)
Inst8lIVueSc8n
Ansi based on Image Processing (screen_2.png)
vuescan_av9.7S0+_atcherv1_
Ansi based on Image Processing (screen_2.png)
?__;?,___gq_,9,
Ansi based on Image Processing (screen_0.png)
_?__?_?v?______
Ansi based on Image Processing (screen_0.png)

Extracted Files

  • Malicious 1

    • dup2patcher.dll
      Size
      59KiB (59904 bytes)
      Type
      pedll executable
      Description
      PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
      AV Scan Result
      Labeled as "HackTool.Patcher" (37/67)
      Runtime Process
      VueScanx32v9.7.50_Patcherv1.2.exe (PID: 2408)
      MD5
      032dca65f80a1c12979837a27e5fed35 Copy MD5 to clipboard
      SHA1
      a385d8f1700e9d2b32d60b3d96d8d6d2db5144a8 Copy SHA1 to clipboard
      SHA256
      a6e44ca9e89a094bbd6bea6c9062d86ad4491ff020973ca85ab12aa2d398ae57 Copy SHA256 to clipboard

Notifications

  • Runtime

  • Enforcing malicious verdict, as a reliable source indicates high confidence
  • Network whitenoise filtering was applied

Community