Conduit Search/Toolbar
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Popularity Rank: | 155 |
| Threat Level: | 50 % (Medium) |
| Infected Computers: | 1,087,080 |
| First Seen: | January 2, 2013 |
| Last Seen: | April 13, 2026 |
| OS(es) Affected: | Windows |

Conduit Search/Toolbar Image
Search.conduit.com is an online search engine which is usually accessed through a toolbar for your web browser. This website and toolbar are the work of the Conduit software. There have been various reports that the Search.conduit.com toolbar makes unauthorized changes to your web browser and that, when it comes time to remove this Browser Helper Object, the lack of a legitimate uninstaller causes several problems on the computer on which Search.conduit.com is installed.
Table of Contents
Problems Associated with the Search.conduit.com Website and Toolbar
Affected computer users have reported that the Search.conduit.com toolbar causes browser redirects, forcing the affected user to visit the Search.conduit.com web page. Affected users have also found that Conduit's toolbar makes unauthorized changes to their web browser settings, such as changing the browser's homepage or its default search engine toolbar. ESG security researchers strongly recommend that users take extra care when installing browser toolbars. These kinds of applications tend to set off red flags when it comes to computer security since browser toolbar are common delivery vehicles for various kinds of malware. There are varieties of browser toolbars that are really adware, spyware or browser hijackers. Hackers take advantage of security vulnerabilities associated with BHOs (Browser Helper Objects) in order to infect their victims with malware. Toolbars that are advertised as helpful are also a practical way for criminals to take advantage of computer users, which are not very experienced in computer security.
Removing the Search.conduit.com Toolbar from Your Computer System
One of the problems associated with the Search.conduit.com toolbar is that Search.conduit.com does not include an uninstaller, making the removal of this application somewhat troublesome. The Search.conduit.com toolbar can be removed through the add/remove programs panel in the control panel. However, affected users will have to restore all the changes that this toolbar makes to their web browser preferences. This means restoring the default search engine and home page. Since this can be a tedious process, some computer users may prefer to reinstall their web browser or to restore it to default settings once the Search.conduit.com toolbar has been uninstalled. The Search.conduit.com toolbar is not attacking your computer like other malware, but Search.conduit.com has characteristics that make Search.conduit.com and inconvenience to many computer users.
Aliases
15 security vendors flagged this file as malicious.
| Antivirus Vendor | Detection |
|---|---|
| Ikarus | not-a-virus:WebToolbar.Rubar |
| Ikarus | PUA.ClientConnect |
| McAfee | Artemis!EAF8104FE812 |
| McAfee-GW-Edition | Artemis!Trojan |
| Avast | Win64:Malware-gen |
| AVG | Generic.ABF |
| McAfee | Artemis!CB65DD8AD8BC |
| Antiy-AVL | RiskWare[WebToolbar:not-a-virus]/Win32.Rubar |
| Kaspersky | not-a-virus:WebToolbar.Win32.Rubar.a |
| Symantec | WS.Reputation.1 |
| AVG | Generic.4CC |
| McAfee-GW-Edition | Artemis |
| McAfee | Artemis!82FC4EAFF415 |
| AVG | SearchProtect.1DD |
| AhnLab-V3 | PUP/Win32.SearchProtect |
SpyHunter Detects & Remove Conduit Search/Toolbar
File System Details
| # | File Name | MD5 |
Detections
Detections: The number of confirmed and suspected cases of a particular threat detected on
infected computers as reported by SpyHunter.
|
|---|---|---|---|
| 1. | A0028368.exe | ced18c00311fab6557daa7bfe9e3ba12 | 4,617 |
| 2. | tbcore3.dll | bed7f9bf0b91a9176c4af2ee157bc438 | 3,925 |
| 3. | tbhelper.dll | b03559bf4499f3707d5221c9743ecd53 | 3,431 |
| 4. | inventoria.exe | b92ba0932cf3a0cb17463844f8da9dd8 | 2,839 |
| 5. | pcreg.exe | e40132435601968995be3bfcda89d470 | 2,759 |
| 6. | avayvaxxvae.exe | bb17bcf355b790bf81670c0ca87ba2ec | 143 |
| 7. | NativeMessageHost.exe.vir | b9c364e152fe5f2f0795ef23dae9d9d5 | 38 |
| 8. | MLSClient.AutoUpdateService.exe | 2d4160fc44148d48ecc30b1073b557e1 | 36 |
| 9. | ConduitRBCB_e1v0.exe.vir | 977941c772377e27827df41793ec6dae | 34 |
| 10. | MlsUI.exe | 591d9419d5945906f50627286d82e5c5 | 31 |
| 11. | A0121692.exe | f86a73c9497327a20ee960c2abca24a7 | 15 |
| 12. | TBHostSupport.dll | 206a8579f166489f3804c95bd23866eb | 14 |
| 13. | prxtbuTor.dll | f539d488bde6d2417bd4819193643251 | 12 |
| 14. | avaxvyvax.exe | 21ce5e311a2a0a2cb7529b71c76578f7 | 8 |
| 15. | The_Pirate_Bay.exe | 92becf79224ac52f9e3943f6040090d7 | 5 |
| 16. | PwmNativeMessaging.exe | 448e74df1e13d4103466be7465218af6 | 4 |
| 17. | NativeMessageHost.exe | b6b568ba7404947bd3d6438cd1a69989 | 2 |
| 18. | ConduitHelper.exe | 280062cb75b91fbf44abc416fc464a80 | 2 |
| 19. | APISupport.dll | 5691d2e4dce886cab24668a4451c0b05 | 2 |
| 20. | fhgc.dll | 22684bf4b2ce6d61df96ad3283242b74 | 1 |
| 21. | fogiohohcp.dll | ce90b03d1dc5ed1afeb1c76d55022bd2 | 1 |
| 22. | ekneeicf.dll | 581b3272fcdab3b63a4d80f8d00c2988 | 1 |
| 23. | ChromeInstaller.exe | 3ea0022c36c504f6bfd405c8204f6d90 | 1 |
| 24. | NativeMessagingApp.exe | e521580e5facef89885cdcdb63e91101 | 1 |
| 25. | TBMessagingHost.exe | 6d3282fa8d14e621193a4e83ea189a31 | 1 |
| 26. | UninstallerUI.exe | 3cb679b8f9bf317aa423487a23efe220 | 1 |
| 27. | ConduitCrashHandler.exe | a4185bdaca04cf569cc14de1b0e9013d | 1 |
| 28. | BackgroundContainer.dll | d42c388f33a2099abc3a311691fa406e | 1 |
Registry Details
Directories
Conduit Search/Toolbar may create the following directory or directories:
| %ALLUSERSPROFILE%\Application Data\Conduit |
| %ALLUSERSPROFILE%\Application Data\Tbccint |
| %ALLUSERSPROFILE%\Conduit |
| %ALLUSERSPROFILE%\Tbccint |
| %LOCALAPPDATA%\Conduit |
| %LOCALAPPDATA%\TBHostSupport |
| %LOCALAPPDATA%\Tbccint |
| %LOCALAPPDATA%\cctbplt |
| %PROGRAMFILES%\AstroburnBar |
| %PROGRAMFILES%\Conduit |
| %PROGRAMFILES%\ConduitEngine |
| %PROGRAMFILES%\Nova |
| %PROGRAMFILES%\Tbccint |
| %PROGRAMFILES%\pcreg |
| %PROGRAMFILES(x86)%\AstroburnBar |
| %PROGRAMFILES(x86)%\Conduit |
| %PROGRAMFILES(x86)%\Nova |
| %PROGRAMFILES(x86)%\Tbccint |
| %PUBLIC%\Conduit |
| %TEMP%\38fdaae5-8e0e-493c-88ec-e05c3be06e42 |
| %TEMP%\AstroburnBar |
| %TEMP%\CT3302872 |
| %TMP%\ct2571160 |
| %Temp%\CT3302999 |
| %Temp%\CT3310393 |
| %Temp%\CT3317212 |
| %Temp%\ct3311333 |
| %Temp%\mam-ct3317212 |
| %USERPROFILE%\AppData\LocalLow\ConduitEngine |
| %USERPROFILE%\AppData\LocalLow\PHPNukeEN |
| %USERPROFILE%\AppData\LocalLow\Tbccint |
| %USERPROFILE%\Configuración local\Datos de programa\Conduit |
| %USERPROFILE%\Configurações Locais\Dados de aplicativos\Conduit |
| %USERPROFILE%\Impostazioni locali\Dati applicazioni\Conduit |
| %USERPROFILE%\Local Settings\Application Data\Conduit |
| %USERPROFILE%\Lokale Einstellungen\Anwendungsdaten\Conduit |
| %USERPROFILE%\Ustawienia lokalne\Dane aplikacji\Conduit |
| %UserProfile%\AppData\LocalLow\Conduit |
| %UserProfile%\Local Settings\Application Data\TBHostSupport |
| %UserProfile%\Local Settings\Application Data\Tbccint |
| %appdata%\Tbccint |
| %programfiles%\PHPNukeEN |
| %programfiles(x86)%\PHPNukeEN |
| %systemdrive%\users\appdata\locallow\Conduit |
| %temp%\Conduit |
| %temp%\ConduitSP |
| %temp%\ct3309759 |
URLs
Conduit Search/Toolbar may call the following URLs:
| &form=CONMHP&conlogo=CT |
| ConduitAutoCompleteSearch |
| npconduitfirefoxplugin |
| www.ourtoolbar.com |
Analysis Report
General information
| Family Name: | Conduit Search/Toolbar |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
f52e42cb0cc7d9197dd37f614eb887f0
SHA1:
fb7eae8f5161cad079e1ee0995002e0994751c3f
SHA256:
21258514DE6C1302B9188DFEB3FB4F5097919E94A6076A5C6474DDEBA6C80CF3
File Size:
2.03 MB, 2027274 bytes
|
|
MD5:
db85d58e9fcb9d892ca72e0b63aff15f
SHA1:
66c8a8105c880eb780b7797b182541aef0adcbde
SHA256:
818DB6EC6E522E718AE3B3BB2BCB52308FB8B2E646A2E1E17166FF378F300AAC
File Size:
2.69 MB, 2690048 bytes
|
|
MD5:
c9b90b925974527f5a93e3a8239f32e6
SHA1:
1dd9b3ac065fabd8b3c2a82f7cb999f84dcac3d0
SHA256:
4E366A56BE7F8027E1A6663A68546A1DBFC4A23FEAE1FB6AF258C5191A7683A1
File Size:
193.95 KB, 193947 bytes
|
|
MD5:
92164ba78c6490098c91c3a8a8a7948f
SHA1:
c2b2cd11723aaf7308be961ad2e51001259eb7fd
SHA256:
CB82099265453F11073246313B5A7F49F865A280ED7C066040B2A518C9C6B644
File Size:
2.31 MB, 2308100 bytes
|
|
MD5:
0edb6c7b31cee6601686a8900d6572a0
SHA1:
9f6026fd8fa9dac3a2199a815646c417ac8cce20
SHA256:
1E0C765BCB34AF47AC30D39AEA6483B549E70F56C5E63B681E9BA07C3D33D0CF
File Size:
38.91 KB, 38912 bytes
|
Show More
|
MD5:
1354eec7a827a779169a19d835c6422a
SHA1:
f3ee5e866ae35516a06507d51388e63b996f45a3
SHA256:
3753F10F6522D7D1C3C03816433CB6B2B5E14FF7E96044A29DC2EC3C85930360
File Size:
643.24 KB, 643244 bytes
|
|
MD5:
abdcc944b942344254b6302a66a4ad5c
SHA1:
edee9a2be943b5d539009dc7bbe5588b851b69d5
SHA256:
7C844786209435712D47BB53D171A2442849F539BEFB2DCB221054816D1538E9
File Size:
55.81 KB, 55808 bytes
|
|
MD5:
63ce763d4a954a9fe0a37ae3c8888abc
SHA1:
e8cf01d615df85264b6dbffe0bd5206b37c738db
SHA256:
7E94DB67C4B3B07E773D4B61A53FEDCBD24E6A5C0C72BDCCCB033267130F3A6C
File Size:
5.16 MB, 5162496 bytes
|
|
MD5:
83fed3b24c8df1eeb5acbba77f0849b1
SHA1:
cc189e8c550e8b491f184ad00ba59bb5836cb960
SHA256:
C2670A1A63C2AF28D2AA554E33DE2B9EFFF21C978A59B6BD82CF9EB3B9180799
File Size:
98.30 KB, 98304 bytes
|
|
MD5:
7420725d5e68bdb10b486ae109487177
SHA1:
0f4f5c08fc48c998298157f134af05161fdab63d
SHA256:
F9CA69C67C116BDDDC9654DE5836939243318165A163EA1992DE32612BFD3A8F
File Size:
2.23 MB, 2229666 bytes
|
|
MD5:
3ccf758d3237f3758a88fca340f7fa5a
SHA1:
ec085c260d83a400f806201156a9b674a4f355d9
SHA256:
5E2F4E2EB2654AAA183CBA48AEF1C85B07AA16779022285CA394B23081A2F536
File Size:
2.13 MB, 2127332 bytes
|
|
MD5:
a47e421fad89004b56ea0c6006a4d484
SHA1:
12917758345e291ad16b56ef56bfc22c07d77464
SHA256:
7F1BA8CF1849A4DC1BA0690660746DD2524BE5C170D8B98C86516710255CA56A
File Size:
2.34 MB, 2335232 bytes
|
|
MD5:
da9aab4dadb984731975fa4b7256c9e8
SHA1:
bbea3dd8dd12c13883bd479b6d86b2d8040d8c54
SHA256:
8412E3FCB1D44DC79814BB64846003C74AD3FB3AA367A7A5F7D0D94D7A1191C9
File Size:
2.58 MB, 2580168 bytes
|
|
MD5:
5086d1f0b3821c926e1d0391b081c3fb
SHA1:
e41231836b719e43b5345e13dd69dca618af7962
SHA256:
C3BE661C0E446190C8A9F70EFDE396CB9E47B0C1DFDF79F690C4694758027F6F
File Size:
697.47 KB, 697472 bytes
|
|
MD5:
1e7b910757d882eff979c9aa0885a10a
SHA1:
645d0d457db2f58aa2ab305847949a306bcf92ca
SHA256:
33099DF29592E0E9E219B7B7974EF7F56C2E50D4746217C32F0C10880CBB8355
File Size:
1.89 MB, 1885800 bytes
|
|
MD5:
42def360b2d9a3de0f360d37ed788ba7
SHA1:
bf3973213c8dd5153fbf6f0a84e5f6f9c5c1a91f
SHA256:
50FB74A6647009793AB47F9EA5C600E8499F2103B2D5025D6E25E6F19269D321
File Size:
811.83 KB, 811831 bytes
|
|
MD5:
1d22bc323e9a53842f6c470838e60a63
SHA1:
58387aeceee5a466145310fddeadd79d5ba2d55f
SHA256:
C5D72843BE6C0FC93D19950942044B31A4E5DFCCF9A4E9CC4C416EE40F525AD1
File Size:
6.03 MB, 6029976 bytes
|
|
MD5:
b78cfa434e8935855feae01b34161c8e
SHA1:
442bdb2600c16862d5b5d97a5db1aa8f433e9eda
SHA256:
CF6AD9B1D2A67BD64A9E2E499EA112B6062B4EFED74DE1786D7FC453F12985D0
File Size:
709.23 KB, 709232 bytes
|
|
MD5:
0f008f0736873d199b80d315197dc991
SHA1:
7fe7abb7e884746ac6981ee5da769a8f170890c7
SHA256:
3021561A27398D32F7FFA49CEC3C523258EF7416DF7A1939A94B368D358A65B5
File Size:
8.13 MB, 8128000 bytes
|
|
MD5:
c8086283449af73a023e71fcc8f5b5be
SHA1:
be1f4242a01315e0ca0d5b7c86f88df23824c01f
SHA256:
8EA1F3911061A3D58382195D3591B4FE1C02F013DF7E0EA199B3CA99BBCC5530
File Size:
2.48 MB, 2484736 bytes
|
|
MD5:
6bbd172b50f978b4f670553f89855605
SHA1:
1e56a2dca0baa6aa87452a41f4ee4cd1ebddc677
SHA256:
984A71C5D31B9FEEB7595E426674647C250A037A887DA14F317B94CB2997334A
File Size:
2.38 MB, 2381526 bytes
|
|
MD5:
3ab416f0ae6a19f4fe6c4f6efb59ccb7
SHA1:
8f9f29d1e4ad3b9995052fa18c03705d508516be
SHA256:
8FA5554CDDA6636F36D5F0603CAC9703438107846702A30E1A1DF4A0AC698FF9
File Size:
6.60 MB, 6601382 bytes
|
|
MD5:
0759e2ef0254cb93453e204873e3c477
SHA1:
3d0f65127e8c6d2ffb28e4ec3802386074e5a778
SHA256:
97529991ADE9EA73CABF0E189714C99CB067ED84279FF88D732FF51054E24C5A
File Size:
5.66 MB, 5657088 bytes
|
|
MD5:
086774d46c86c4fec1893761e31603b3
SHA1:
78bc4b9a8e24fa3be4dd72e6a62659802a47ee86
SHA256:
6B496D8E98E8A10DAEB39E5F0DD4F6A25D438F0BF466C7FCD2AD93AF4F36F155
File Size:
229.99 KB, 229989 bytes
|
|
MD5:
7ea4e58055bd8b2035fd502b00fca3c3
SHA1:
41cc63a673a870c569080e0177dd3959abef9419
SHA256:
9F53FBB72649CFA2FA870F7AFAB140B2BE44FEE0E6943B430510C921EA647976
File Size:
5.13 MB, 5134336 bytes
|
|
MD5:
be0641a5e7b37adff16a2d23494c2c79
SHA1:
96130c65ed1bc0d380b6be0b131dd723cd0be5c8
SHA256:
8CE5B679E50ACF5C25762C162373E18F42BB4F66B127DC74938966624CCED976
File Size:
2.13 MB, 2127349 bytes
|
|
MD5:
e93f5d82408fedce1b3b3debd2b097ce
SHA1:
4e8880abd457ee206fc8eb3e6d4f1daa47fce4fe
SHA256:
409255A82463AB12D033E50002BCB330D9AD646F0EDB95AAFBF042855F6C6F97
File Size:
2.62 MB, 2621626 bytes
|
|
MD5:
a53250e494507273950bab235c86460c
SHA1:
01bccd16dadafc4789907771f3cf569215aa1515
SHA256:
8494FDAC23ED06CF8CA308A162AEC6908D80AC9E0344121C52D9FEBD6C86325D
File Size:
4.93 MB, 4927276 bytes
|
|
MD5:
8d7b1ec679801210948cbf2ddd7bc234
SHA1:
7292f633d2d3129a6bbaf1b9c442d0bb2a5fe197
SHA256:
534DA6C150C48DE80C132C4924251CAE3D9A05C59102CD9A569445A48118E7D0
File Size:
148.12 KB, 148118 bytes
|
|
MD5:
0301c687a0c834eb17a2542c3ebcb16b
SHA1:
0502d1bdc9fb6f26fd5ca1a1951b85624e7f9015
SHA256:
87A461B41AB50F7230BBFBA80810FA84356694165769432C1D52F8215463AADB
File Size:
1.38 MB, 1384720 bytes
|
|
MD5:
4488afc664ec3e44a8061936d9386a67
SHA1:
8790c7fa39911b6ba62e2e95a4e73e8d1335368b
SHA256:
A29A0B904E16C271BD339C1E1408591A6FA7843C428A8F23D0DF087D34AF2293
File Size:
391.83 KB, 391832 bytes
|
|
MD5:
143e6992dde1b8eae4278514c868a989
SHA1:
69a5a78b1eaa7b2f17a82f6879044ec9294e8b9d
SHA256:
3A4FFBB4BC22B6DAD8105BA94BE8540C2A50D0FF69CEA787989986E7F8F40E76
File Size:
2.37 MB, 2374426 bytes
|
|
MD5:
3fa5dfffcb10574849828446ad9e01d3
SHA1:
40d0d84abf0a983fbe6a3a9af9cbea20102fbfda
SHA256:
3818CFD2BA16D0D575C52A68F78F8E4E3C8A26A977FF06AACF3B9729BBC8A7A8
File Size:
193.92 KB, 193923 bytes
|
|
MD5:
d87069bef3c7211d69f1be08a122821f
SHA1:
21f70f10f866416c911877fa1ae04ed0593b1076
SHA256:
D4748F5ECEEF5D7041856AF26A5CDFA5452999C7B0BD19070A8521908C3F6F96
File Size:
2.03 MB, 2033573 bytes
|
|
MD5:
9c7fb3fb4202e73fbc1e89a77af86e1e
SHA1:
5e3a1bee51f8d9ba154002b04ac6870bdca4ce10
SHA256:
C7B16C71C50499883AF1BDCBD9204D8810FEF813A53C67B06D0F0515EC2B3FE0
File Size:
45.06 KB, 45056 bytes
|
|
MD5:
9b6eb967e2950ac600dd87b7df389b9b
SHA1:
bafd59ef5cf6a57c7b9a244376ed8900b71265b3
SHA256:
E921F0148F1EBA61F5B30244B8F4773FB9E7247621A52506855335F9F50B9B28
File Size:
45.57 KB, 45568 bytes
|
|
MD5:
fc671f784ce23f639533b52be7671d0c
SHA1:
26a31db5603bae3d5ea295702b4752422b891470
SHA256:
1A940E7B7EBAE7C6EE066938A147A198094DAE275569B1F158658C2AD174714B
File Size:
38.91 KB, 38912 bytes
|
|
MD5:
4c967ef096bdff39a697440998939892
SHA1:
b323bf2f03e9f95a405ee7639bf55b6d7013faf6
SHA256:
E1B2347C0BFA18DC5FBEA899BBE80305347234F77863E2FBBBEB455908F3284A
File Size:
52.22 KB, 52224 bytes
|
|
MD5:
677f67dc9806978461318409d5090a7c
SHA1:
99166e4db77233024f2fc0f3682d592ea1adc470
SHA256:
AAD86771ECDE8EB9B034BA2201BA071954F783ABF340A6674E6DDCE4A63D931B
File Size:
5.85 MB, 5849601 bytes
|
|
MD5:
6d5823e5bcfeb67104d6568919568964
SHA1:
224a2dc9dfa30845217a2d03d13706a4752839b6
SHA256:
94A32CD2D0BBC6AC8FBB96D98F1B023C8573986016FCE4D15028A940BAD97ADE
File Size:
126.60 KB, 126600 bytes
|
|
MD5:
213e6a62a226399702a6dd3c780b8cef
SHA1:
86dd604adff48c0f0aace68faaad09469a539434
SHA256:
9ADAB4ADB68FE7B67AEDF27FCD1B83BA1A9D8BEAD23A8AB1802D7900B6D2E0ED
File Size:
234.92 KB, 234920 bytes
|
|
MD5:
a21226098986d9046d0c3881c1348b28
SHA1:
f4d57dcfdb62506176a76bde2f95f94272fff0f8
SHA256:
A55FA7864F61E7A291A904BA67B429CAC987FF85070FB0766DDE2E2CB4F95699
File Size:
45.06 KB, 45056 bytes
|
|
MD5:
b1f0d50ddb9dd6eb1d7f7ca462f8f6ff
SHA1:
e5c62f68306ac2f8d811a2566935ecd20a541076
SHA256:
BEE86EF9BB72A8894198945CE20A3D27FF9782860E4CA50C9EC0DC18BF9CD5C0
File Size:
38.91 KB, 38912 bytes
|
|
MD5:
fb1d55a4beae86512b7ed15a7898368b
SHA1:
5c18ff3d918f212e65d33faa4d7753c0a9d2c58b
SHA256:
000DC3F4E57E03C33427A91A964788CCE44447B38717FB7933F263B0BD7CA7E8
File Size:
1.82 MB, 1821424 bytes
|
|
MD5:
e481ec8c8585c7148e1f286a1ac0c5bd
SHA1:
ce59d83445350b964b5e198a0cdf35af3fe19180
SHA256:
3491D3F27A00B92AD39444794EEDCC231A24D32E565E3E34D87E21809F0DE0A5
File Size:
2.03 MB, 2034144 bytes
|
|
MD5:
e31dc7ff82efc7e7eeac211b836474a2
SHA1:
56529800f44f1761894eca1f933f7a3ecfdd903d
SHA256:
346041D7BA843607FA83289EBE20AAB3B0111B2A1B9A113EB901197FE8A1C34D
File Size:
2.03 MB, 2026520 bytes
|
|
MD5:
1d525a77dcf397186717380510e41a48
SHA1:
f08f0fa2ca286e1921166bd01d80fb39eadf0497
SHA256:
626180D9FC3FB34C293D910AF516594EB9C87FDD93B07133E4E5FF18347D0A07
File Size:
924.50 KB, 924504 bytes
|
|
MD5:
9e73192a3024792126454e73228dad2d
SHA1:
3bdcbd105ec0539a1b6252f2d943d603ae1341e2
SHA256:
70CD6B9997FA11554D0CF3F1014BB4EE4E3E3D89A064F7C45EBA5B4DFA1787EF
File Size:
209.28 KB, 209284 bytes
|
|
MD5:
791e1b1119718a4882d7e7281af31523
SHA1:
466edbf25b71e0d345b45c730d7d254ee8ec6022
SHA256:
D5315BF98DEEBBB90C89883EABCD6036D49371716F43F1BA9AA367ABCF7C980D
File Size:
38.91 KB, 38912 bytes
|
|
MD5:
a3d7e4f889a9554ebe3059bc0a95dfed
SHA1:
b21f47e6c667de9fb10bd56fa827240c2a2aff66
SHA256:
2425666377374F04314A1EDFAC413C74BB90718EE006D4BA76A8CFF62F613914
File Size:
3.53 MB, 3531264 bytes
|
|
MD5:
a6fa78b337bfce16406cc3079c5ca403
SHA1:
a0f7903e60bba01459e014e4607898b01d8b27a2
SHA256:
B5DA4195CDE05E26A21BDA185AE3189861A2E117BDA4FB8036C297293AF1BD34
File Size:
4.70 MB, 4702208 bytes
|
|
MD5:
f74c14919453188095429f66e2f7c93c
SHA1:
31d43838065b90238fb34a5074c271c860d0c68c
SHA256:
BB835B6BA101BEBD5DB03B25790D5A3010B49344D8499BE0D83FE02D136D6684
File Size:
71.78 KB, 71775 bytes
|
|
MD5:
76902a8ed26feba8369d8aa91c241163
SHA1:
c46938e4f2a04d2404b3019bcabb855639ff6fc4
SHA256:
1880ED9CD075A8D11CE70044B5D9AE4D42CF710B2570A469EBD767135BFA1FBE
File Size:
1.56 MB, 1560848 bytes
|
|
MD5:
62d978a2f1aebbe60ba6fae9ae93c0fc
SHA1:
e329887d27ee39f7e24b2e1fe3c3f391fcbbf234
SHA256:
C4A86EDB54B723EBCA3840A1EEF99D6D43226C1B271CC5A17129AEA392653034
File Size:
489.47 KB, 489472 bytes
|
|
MD5:
2fdf211880b4d1831025ca446714fa9f
SHA1:
94e670d06ef968594185c555d597fee6247a621f
SHA256:
09DCA863AFF0C8C46DEDEDADCA168C5E40FE9AD1AD84FE4FEF9694FC8984811D
File Size:
52.22 KB, 52224 bytes
|
|
MD5:
0094f51430f684d5c013b3192f1be468
SHA1:
f4dec31f7a9f78c90c274f189ba2b82ffc406376
SHA256:
A625B049A6B82039D32060663E8784B04E91DB2B89381E9728A8A7498206920D
File Size:
8.04 MB, 8036936 bytes
|
|
MD5:
8db9c9a5d925f9d4617238dcff6d6d60
SHA1:
25ec4336940d181dcb73ea1bc9871a9880bb3694
SHA256:
48363EC767C9F12A29D4EB4A775C8C73037B056D62D128FAE21A092FB438153B
File Size:
213.53 KB, 213535 bytes
|
|
MD5:
b93954ec19506e3b01ad41cc7ceb6611
SHA1:
365f671cebf5dfd83e4a65723f8366658ca16743
SHA256:
8119AFAF4264A49BAB6E723A7430AF396F1EF1885DE1A6FBEAA3B10E5E5F4DD2
File Size:
732.30 KB, 732296 bytes
|
|
MD5:
26310edf51ea4bd83c9881e640116ad2
SHA1:
7ff65dfb3a36e1ac82b53f16a5a959227e939999
SHA256:
8E9A3D6870050FAB435DE652ADB5627D1343978AE7484DBB3F9EAD2A6EDDBAA1
File Size:
2.62 MB, 2621565 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have relocations information
- File doesn't have security information
- File has been packed
- File has exports table
- File has TLS information
- File is .NET application
- File is 32-bit executable
Show More
- File is console application (IMAGE_SUBSYSTEM_WINDOWS_CUI)
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Show More
Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Assembly Version | 0.0.0.0 |
| Checksum |
|
| Comments |
|
| Company Name |
Show More
|
| File Description |
Show More
|
| File Version |
Show More
|
| Internal Name |
Show More
|
| Legal Copyright |
Show More
|
| Legal Trademarks | ConverterLite |
| Original Filename |
Show More
|
| Plateforme |
|
| Private Build | September 7, 2009 |
| Product Name |
|
| Product Version |
Show More
|
| Special Build | stable34 stable |
| Version |
|
| Version V I |
|
Digital Signatures
Digital Signatures
This section lists digital signatures that are attached to samples within this family. When analyzing and verifying digital signatures, it is important to confirm that the signature’s root authority is a well-known and trustworthy entity and that the status of the signature is good. Malware is often signed with non-trustworthy “Self Signed” digital signatures (which can be easily created by a malware author with no verification). Malware may also be signed by legitimate signatures that have an invalid status, and by signatures from questionable root authorities with fake or misleading “Signer” names.| Signer | Root | Status |
|---|---|---|
| Amnis Technology Ltd | Amnis Technology Ltd | Self Signed |
| BitTorrent Inc | BitTorrent Inc | Hash Mismatch |
| BitTorrent Inc | Symantec Class 3 SHA256 Code Signing CA | Hash Mismatch |
| NCH Software | Thawte Code Signing CA | Self Signed |
| Conduit Ltd. | VeriSign Class 3 Code Signing 2004 CA | Root Not Trusted |
Show More
| Conduit Ltd. | VeriSign Class 3 Code Signing 2009-2 CA | Root Not Trusted |
| AnchorFree Inc | VeriSign Class 3 Code Signing 2010 CA | Self Signed |
| ClientConnect LTD | VeriSign Class 3 Code Signing 2010 CA | Self Signed |
| Conduit Ltd. | VeriSign Class 3 Code Signing 2010 CA | Self Signed |
| Safe Download x3 | thawte Primary Root CA | Root Not Trusted |
File Traits
- .NET
- 2+ executable sections
- big overlay
- BINinO
- dll
- HighEntropy
- MZ (In Overlay)
- packed
- SusSec
- Wise
Show More
- WriteProcessMemory
- x86
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- AdGazelle.A
- Downloader.Agent.TJ
- Mobogenie
- NetBus.A
- SearchSuite.C
Show More
- Sqwire.AA
- Zusy.CA
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| \device\namedpipe | Generic Read,Write Attributes |
| \device\namedpipe | Generic Write,Read Attributes |
| \device\namedpipe\gmdasllogger | Generic Write,Read Attributes |
| c:\c:\users\user\appdata\local\temp\install.log | Generic Write,Read Attributes |
| c:\c:\users\user\appdata\local\temp\install.log | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\2k10\utorrent\settings.dat | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\2k10\utorrent\settings.dat | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\2k10\utorrent\utorrent.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\2k10\utorrent\utorrent.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\2k10\utorrent\utorrent.lng | Generic Write,Read Attributes |
Show More
| c:\users\user\appdata\local\temp\2k10\utorrent\utorrent.lng | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\7z912.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\7z912.exe | Synchronize,Write Data |
| c:\users\user\appdata\local\temp\captura.bmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\earth3d-1_0_5.zip | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\earth3d-1_0_5.zip | Synchronize,Write Data |
| c:\users\user\appdata\local\temp\emule0.49b-installer1.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\emule0.49b-installer1.exe | Synchronize,Write Data |
| c:\users\user\appdata\local\temp\emule0.50a-installer.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\emule0.50a-installer.exe | Synchronize,Write Data |
| c:\users\user\appdata\local\temp\emuleplus-1.2e.installer.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\emuleplus-1.2e.installer.exe | Synchronize,Write Data |
| c:\users\user\appdata\local\temp\glb2bbb.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\glb41ae.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\glb4e33.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\glb4f54.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\glb5bd7.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\glb9280.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\glb96ab.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\glba255.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\glba38a.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\glba6f9.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\glbfdaa.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\glc2d8f.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\glc4364.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\glc5075.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\glc50db.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\glc5cf1.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\glc9407.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\glc9870.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\glca41a.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\glca520.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\glca831.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\glcfee3.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\glf611b.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\glf611b.tmp | Synchronize,Write Data |
| c:\users\user\appdata\local\temp\glface.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\glface.tmp | Synchronize,Write Data |
| c:\users\user\appdata\local\temp\glfb005.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\glfb005.tmp | Synchronize,Write Data |
| c:\users\user\appdata\local\temp\glg395a.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\glg4f2e.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\glg5533.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\glg5c4f.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\glg610b.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\glg9fd1.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\glga43a.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\glgaad.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\glgac8a.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\glgafe5.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\glgb148.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\glk2dcf.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\glk4393.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\glk50d3.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\glk510b.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\glk9437.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\glk98bf.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\glka55f.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\glka861.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\glm5d11.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\glma44a.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\glmff13.tmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\hssinst.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\hssinst.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\hssinstaller.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\hssinstaller.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\hssinstaller64.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\hssinstaller64.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\hssinstaller\hssinstaller.txt | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\messenger_plus.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\messenger_plus.exe | Synchronize,Write Data |
| c:\users\user\appdata\local\temp\n1s.cab | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\n1s.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\n1s.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\n1s\nchdata.cab | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\n1s\nchdata.dat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\n1s\nchsetup.cab | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\n1s\nchsetup.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\n1s\nchsetup.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nchuninst\uninst.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144 |
| c:\users\user\appdata\local\temp\nsa3030.tmp\installoptions.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsa3030.tmp\iospecial.ini | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\nsa3030.tmp\iospecial.ini | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsa3030.tmp\langdll.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsa3030.tmp\modern-wizard.bmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsa3030.tmp\pantallatoolbar | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\nsa3030.tmp\pantallatoolbar | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsa3030.tmp\uac.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsaa302.tmp\installoptions.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsaa302.tmp\iospecial.ini | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\nsaa302.tmp\iospecial.ini | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsaa302.tmp\langdll.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsaa302.tmp\modern-wizard.bmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsaa302.tmp\pantallatoolbar | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\nsaa302.tmp\pantallatoolbar | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsaa302.tmp\uac.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsb4e2.tmp\system.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsb4e2.tmp\webapphost.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsbbe45.tmp\installoptions.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsbbe45.tmp\iospecial.ini | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\nsbbe45.tmp\iospecial.ini | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsbbe45.tmp\langdll.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsbbe45.tmp\modern-wizard.bmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsbbe45.tmp\pantallapubli | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\nsbbe45.tmp\pantallapubli | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsbbe45.tmp\uac.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsc3934.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nsca832.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsca832.tmp\a.txt | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsca832.tmp\a.txt_deleted_ | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsca832.tmp\inetc.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsca832.tmp\inetc.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nse7834.tmp\installoptions.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nse7834.tmp\iospecial.ini | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\nse7834.tmp\iospecial.ini | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nse7834.tmp\langdll.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nse7834.tmp\modern-wizard.bmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nse7834.tmp\pantallatoolbar | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\nse7834.tmp\pantallatoolbar | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nse7834.tmp\uac.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nseb9d0.tmp\buttonevent.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nseb9d0.tmp\conduit_toolbar.bmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nseb9d0.tmp\conduit_toolbar.bmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nseb9d0.tmp\execdos.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nseb9d0.tmp\hss_icon_trans_96x96.bmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nseb9d0.tmp\hss_trans.bmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nseb9d0.tmp\modern-header.bmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nseb9d0.tmp\nsdialogs.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nseb9d0.tmp\nsisos.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nseb9d0.tmp\psdll.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nseb9d0.tmp\system.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nseb9d0.tmp\userinfo.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsg160e.tmp\installoptions.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsg160e.tmp\iospecial.ini | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\nsg160e.tmp\iospecial.ini | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsg160e.tmp\langdll.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsg160e.tmp\modern-wizard.bmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsg160e.tmp\pantallatoolbar | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\nsg160e.tmp\pantallatoolbar | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsg160e.tmp\uac.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsg5fe4.tmp\installoptions.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsg5fe4.tmp\iospecial.ini | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\nsg5fe4.tmp\iospecial.ini | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsg5fe4.tmp\langdll.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsg5fe4.tmp\modern-wizard.bmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsg5fe4.tmp\pantallatoolbar | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\nsg5fe4.tmp\pantallatoolbar | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsg5fe4.tmp\uac.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsg62bd.tmp\converterlite.bmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsg62bd.tmp\modern-wizard.bmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsg62bd.tmp\nsdialogs.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsg62bd.tmp\splash.bmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsg62bd.tmp\system.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsg6658.tmp\installoptions.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsg6658.tmp\iospecial.ini | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\nsg6658.tmp\iospecial.ini | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsg6658.tmp\langdll.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsg6658.tmp\modern-wizard.bmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsg6658.tmp\pantallatoolbar | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\nsg6658.tmp\pantallatoolbar | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsg6658.tmp\uac.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsge6f9.tmp\certinlinelb.pfx | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsge6f9.tmp\dm_loader.gif | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsge6f9.tmp\failed.htm | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsge6f9.tmp\fdmclient.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsge6f9.tmp\icon.png | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsge6f9.tmp\manager\init.html | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsge6f9.tmp\manager\manager.html | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsge6f9.tmp\manager\scripts\gplay.js | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsge6f9.tmp\manager\scripts\jquery-1.10.1.min.js | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsge6f9.tmp\manager\scripts\manager.js | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsge6f9.tmp\manager\scripts\sharedworker.js | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsge6f9.tmp\manager\scripts\webbrowser_embedded.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsge6f9.tmp\nonesilentsuccess.htm | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsge6f9.tmp\proxy.html | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsge6f9.tmp\success.htm | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsge6f9.tmp\system.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsge6f9.tmp\webapphost.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsge6f9.tmp\welcomescreen.htm | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsifd50.tmp\tb.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsjfee6.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nskfc.tmp.tbexpr.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsl628d.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nslbc61.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nslbc62.tmp\langdll.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsm4d2.tmp | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete |
| c:\users\user\appdata\local\temp\nsma786.tmp\background.bmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsma786.tmp\header.bmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsma786.tmp\header_dl.bmp | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsma786.tmp\modern-header.bmp | Generic Write,Read Attributes |
118 additional files are not displayed above.
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | Data | API Name |
|---|---|---|
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::proxybypass | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::intranetname | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::uncasintranet | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::autodetect | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | 澸 ȁ 龡^ 獖} 좟Ê | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKCU\software\nch software\wavepad\registration::name | RegNtPreCreateKey | |
| HKCU\software\microsoft\registration\nch::wavepad | 1 | RegNtPreCreateKey |
| HKCU\software\nch software\wavepad\registration::rd | aVQ& | RegNtPreCreateKey |
Show More
| HKLM\software\wow6432node\express-files\toolbar::markoldapps | FALSE | RegNtPreCreateKey |
| HKCU\software\microsoft\internet explorer\main\featurecontrol\feature_browser_emulation::e41231836b719e43b5345e13dd69dca618af7962_0000697472 | ⫸ | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | RegNtPreCreateKey | |
| HKCU\software\microsoft\internet explorer\main\featurecontrol\feature_browser_emulation::442bdb2600c16862d5b5d97a5db1aa8f433e9eda_0000709232 | ⫸ | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | *1\??\C:\Windows\SystemTemp\MicrosoftEdgeUpdate.exe.old122e4 *1\??\C:\Windows\SystemTemp\CopilotUpdate.exe.old12352 *1\??\C:\P | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc3475 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 魫拹왼ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 騑挘왼ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 葪捃왼ǜ | RegNtPreCreateKey |
| HKCU\software\microsoft\internet explorer\main\featurecontrol\feature_browser_emulation::365f671cebf5dfd83e4a65723f8366658ca16743_0000732296 | ⫸ | RegNtPreCreateKey |
| HKCU\software\microsoft\internet explorer\main\featurecontrol\feature_browser_emulation::webbrowser_embedded.exe | ⫸ | RegNtPreCreateKey |
| HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\content::cacheprefix | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\cookies::cacheprefix | Cookie: | RegNtPreCreateKey |
| HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\history::cacheprefix | Visited: | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Anti Debug |
|
| User Data Access |
|
| Process Manipulation Evasion |
|
| Process Shell Execute |
|
| Service Control |
|
| Network Info Queried |
|
| Syscall Use |
Show More
|
| Network Winsock2 |
|
| Other Suspicious |
|
| Encryption Used |
|
| Network Winsock |
|
| Cert Store Read |
|
| Cert Store Write |
|
| Network Wininet |
|
| Network Winhttp |
|
| Process Terminate |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
C:\Users\Amqjqnol\AppData\Local\Temp\GLB4F54.tmp C:\Users\Amqjqnol\AppData\Local\Temp\GLB4F54.tmp 4736 c:\users\user\DOWNLO~1\66C8A8~1
|
(NULL) C:\Users\Amqjqnol\appdata\local\temp\\SOFTON~1.EXE /s -silent -DefaultSearch=TRUE -StartPage=TRUE -showPersonalCompDialog=FALSE
|
C:\Users\Amqjqnol\AppData\Local\Temp\GLB5BD7.tmp C:\Users\Amqjqnol\AppData\Local\Temp\GLB5BD7.tmp /s -silent -DefaultSearch=TRUE -StartPage=TRUE -showPersonalCompDialog=FALSE 4736 C:\Users\Amqjqnol\appdata\local\temp\SOFTON~1.EXE
|
open C:\Users\Nmvpenlf\AppData\Local\Temp\nchuninst\uninst.exe -u
|
C:\Users\Cafmwnnr\AppData\Local\Temp\GLB9280.tmp C:\Users\Cafmwnnr\AppData\Local\Temp\GLB9280.tmp 4736 c:\users\user\DOWNLO~1\E8CF01~1
|
Show More
(NULL) C:\Users\Cafmwnnr\appdata\local\temp\EMULE0~1.EXE
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\cc189e8c550e8b491f184ad00ba59bb5836cb960_0000098304.,LiQMAxHB
|
"C:\Users\Zxvzvota\AppData\Local\Temp\nsiFD50.tmp\tb.exe" -installsp=false
|
(NULL) uTorrent.exe
|
C:\Users\Lnioyjls\AppData\Local\Temp\GLB96AB.tmp C:\Users\Lnioyjls\AppData\Local\Temp\GLB96AB.tmp 4736 c:\users\user\DOWNLO~1\7FE7AB~1
|
(NULL) C:\Users\Lnioyjls\appdata\local\temp\\EMULE0~1.EXE
|
C:\Users\Yrhmnrbv\AppData\Local\Temp\GLB41AE.tmp C:\Users\Yrhmnrbv\AppData\Local\Temp\GLB41AE.tmp 4736 c:\users\user\DOWNLO~1\BE1F42~1
|
C:\Users\Sasnmjrf\AppData\Local\Temp\GLB4E33.tmp C:\Users\Sasnmjrf\AppData\Local\Temp\GLB4E33.tmp 4736 c:\users\user\DOWNLO~1\3D0F65~1
|
C:\Users\Kxwgrvia\AppData\Local\Temp\GLB2BBB.tmp C:\Users\Kxwgrvia\AppData\Local\Temp\GLB2BBB.tmp 4736 c:\users\user\DOWNLO~1\41CC63~1
|
(NULL) C:\Users\Kxwgrvia\appdata\local\temp\\EMULEP~1.EXE
|
C:\Users\Rcgkluuy\AppData\Local\Temp\GLBFDAA.tmp C:\Users\Rcgkluuy\AppData\Local\Temp\GLBFDAA.tmp 4736 c:\users\user\DOWNLO~1\0502D1~1
|
(NULL) C:\Users\Lsslgtvs\AppData\Local\Temp\n1s.exe "c:\users\user\downloads\8790c7fa39911b6ba62e2e95a4e73e8d1335368b_0000391832"
|
C:\Users\Liyjzueh\AppData\Local\Temp\GLBA38A.tmp C:\Users\Liyjzueh\AppData\Local\Temp\GLBA38A.tmp 4736 c:\users\user\DOWNLO~1\B21F47~1
|
C:\Users\Eevnnaxh\AppData\Local\Temp\GLBA6F9.tmp C:\Users\Eevnnaxh\AppData\Local\Temp\GLBA6F9.tmp 4736 c:\users\user\DOWNLO~1\A0F790~1
|
(NULL) C:\Users\Eevnnaxh\appdata\local\temp\\MESSEN~1.EXE /s -silent -DefaultSearch=TRUE -StartPage=TRUE -showPersonalCompDialog=FALSE -Fix404=TRUE -InstallType=ConduitIntegration -InstallId=Messenger_Plus.exe
|
"C:\Users\Gmbacneo\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=c:\users\user\downloads\
|
C:\Users\Upehbkva\AppData\Local\Temp\GLBA255.tmp C:\Users\Upehbkva\AppData\Local\Temp\GLBA255.tmp 4736 c:\users\user\DOWNLO~1\C46938~1
|
(NULL) C:\Users\Avxwuuoz\AppData\Local\Temp\n1s\nchsetup.exe -installer "c:\users\user\downloads\e329887d27ee39f7e24b2e1fe3c3f391fcbbf234_0000489472" -instdata "C:\Users\Avxwuuoz\AppData\Local\Temp\n1s\nchdata.dat"
|
"C:\Users\Dwgmwbzp\AppData\Local\Temp\HssInstaller.exe" -iswow64
|
"C:\Users\Dwgmwbzp\AppData\Local\Temp\HssInstaller.exe" -vmcheck
|
"C:\Users\Dwgmwbzp\AppData\Local\Temp\HssInstaller64.exe" -installdriver -c
|