Threat Database Adware Adware.Linkury.BA

Adware.Linkury.BA

By CagedTech in Adware

Threat Scorecard

Popularity Rank: 16,728
Threat Level: 20 % (Normal)
Infected Computers: 1,054
First Seen: December 1, 2009
Last Seen: October 10, 2025
OS(es) Affected: Windows

Aliases

8 security vendors flagged this file as malicious.

Antivirus Vendor Detection
Panda Trj/Qhost.GK
Sophos Troj/Dial-DF
Prevx1 Malware.Gen
Panda Suspicious file
Kaspersky Trojan.Win32.Qhost.kk
Ikarus Trojan-Dialer.VTM
Symantec Trojan.Linkoptimizer.B
eSafe suspicious Trojan/Worm

File System Details

Adware.Linkury.BA may create the following file(s):
# File Name MD5 Detections
1. zmwjza.exe 7fd4aba0b6ce161ed5810f14ceeb0596 0
2. 2407578.exe 1f422e26ab5514200bd29a1c65cebc64 0
3. 990296.exe 06953af83737c188a9425f45ece1c42e 0

Analysis Report

General information

Family Name: Adware.Linkury.BA
Signature status: No Signature

Known Samples

MD5: bff389f74a62ba7f3b802d9a2fd3e3e8
SHA1: 653c3187918eb43d19661e3addf5de0a48eba8df
File Size: 667.14 KB, 667136 bytes
MD5: a7033494c7c6297f8fa228b72cbae6be
SHA1: 990101bfffbf8d735d7e3c64316782509cafe0a6
SHA256: C3C24860564594560D2C704383B0DF7FCE50B4965850AF1A1DACD35CAFE6A859
File Size: 3.07 MB, 3070787 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
File Version 1.0.0.3

File Traits

  • HighEntropy
  • No Version Info
  • x86

Files Modified

File Attributes
c:\users\user\appdata\local\temp\nsp489f.tmp Synchronize,Write Attributes
c:\users\user\appdata\local\temp\nsp489f.tmp\system.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsp489f.tmp\system.dll Synchronize,Write Attributes

Registry Modifications

Key::Value Data API Name
HKLM\system\controlset001\control\session manager::pendingfilerenameoperations \??\C:\Users\Vowpacxt\AppData\Local\Temp\nsp489F.tmp\ RegNtPreCreateKey

Windows API Usage

Category API
Anti Debug
  • OutputDebugString

Trending

Most Viewed

Loading...