Threat Database Adware Adware.WhenU

Adware.WhenU

By CagedTech in Adware

Threat Scorecard

Popularity Rank: 6,534
Threat Level: 20 % (Normal)
Infected Computers: 973
First Seen: July 24, 2009
Last Seen: January 26, 2026
OS(es) Affected: Windows

Aliases

15 security vendors flagged this file as malicious.

Antivirus Vendor Detection
Panda Generic Malware
AVG Generic_c.HS
Fortinet Adware/Newdotnet
Ikarus not-a-virus:AdWare.Win32.NewDotNet
AhnLab-V3 Win-Adware/SaveNow.862105
Sophos WhenU
AntiVir ADSPY/SaveNo.AR.1.A
F-Secure Adware.Whenu.Savenow
Comodo UnclassifiedMalware
BitDefender Adware.Whenu.Savenow.A
Kaspersky not-a-virus:AdWare.Win32.SaveNow.ak
ClamAV Adware.SaveNow-9
Avast Win32:Adware-gen [Adw]
F-Prot W32/Adware.WQU
NOD32 Win32/Adware.WhenUSave

File System Details

Adware.WhenU may create the following file(s):
# File Name MD5 Detections
1. ss2r2.exe 411c0dac755c75716225dc491f202da0 9
2. Save.exe a1cde69eb9cc64da290e70b6c7702487 0

Registry Details

Adware.WhenU may create the following registry entry or registry entries:
File name without path
Search.exe
sync.exe
Run keys
ClockSync
WhenUSearch

Analysis Report

General information

Family Name: Adware.WhenU
Signature status: Root Not Trusted

Known Samples

MD5: 32a1f373a6366cf248f74c5d5ef06583
SHA1: c6ab08c49fbe7021744507913e5146bf3369a07e
SHA256: A2F20DC63AC9CC6E90C002E25016D73C3D6705111284960047F56040917BEC1E
File Size: 2.06 MB, 2063479 bytes
MD5: 2a0facf5f9bc5d190540674cb433279c
SHA1: c48acc17dd575e79f83c29f37e9932e1e93c2460
SHA256: B660824D3AAC97DF2144FD2F8323B6674F9CC79E21317B2DEA109962291ED62B
File Size: 1.34 MB, 1342013 bytes
MD5: 1833f646a0eacbf671a2c7790ef64d6a
SHA1: bd7b38772805e7a37091174f88c17620293f4c6d
SHA256: CB19CF7E050F62C4DB7F0A7A3A10F948D403DD0280592DE277D506447C5CCE26
File Size: 3.52 MB, 3521888 bytes
MD5: 2ade4d204b3fef22f087d3165a833099
SHA1: cac3a0a4f2813ab8c11190fb3d230bc906ca2baf
SHA256: CD02C93AB8235DCDA76BD14BD4901C8235B0A27A406C12371F11299CF829E51B
File Size: 71.68 KB, 71680 bytes
MD5: 9d4ca6969ebe91ed876762b6a84068e5
SHA1: 86bae102dabce02ddd33ec738360794aaf944b89
SHA256: A87CD59684FDE45D396CCD133F1C5F6EA2D642158AFEA3191D2FF0E4059D7561
File Size: 2.62 MB, 2615416 bytes
Show More
MD5: 867359b24f2e6ad72af1741d8a4c9dc9
SHA1: 9f0ead1988ad6c0807d84592007cb494ea11d8d6
SHA256: 12190BF71EA2D6CDF047530B8074C3B9E8F7AFDFFAE66CA495606E925AB717A4
File Size: 3.40 MB, 3399520 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File has exports table
  • File has TLS information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
Show More
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Comments This installation was built with Inno Setup: http://www.innosetup.com
Company Name
  • Free Peers, Inc.
  • Freeze, LLC
  • i.Tech Tecnologia da Informacao Ltda.
  • w3i
File Description
  • BearShare Installer
  • Flash CD & DVD Burner Setup
  • Freeze.com Installer
  • Living Marine Aquarium 2 Screen Saver
  • Microke Setup
File Version
  • 5.2.3.5PL
  • 5.2.1.2PL
  • 3.1.0.0
  • 1.1.0.74437
Legal Copyright
  • Copyright (C) 2001 Free Peers, Inc.
  • Freeze, LLC
  • w3i

Digital Signatures

Signer Root Status
Free Peers Inc. Thawte Premium Server CA Root Not Trusted
Freeze.com, LLC VeriSign Class 3 Code Signing 2004 CA Root Not Trusted

File Traits

  • x86

Block Information

Total Blocks: 26
Potentially Malicious Blocks: 0
Whitelisted Blocks: 26
Unknown Blocks: 0

Visual Map

0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • NetBus.A
  • Sqwire.AA

Files Modified

File Attributes
\device\namedpipe\gmdasllogger Generic Write,Read Attributes
c:\users\user\appdata\local\temp\glb4d20.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\glbaa83.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\glbf147.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\glc4dd5.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\glc4fef.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\glcac29.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\glcf2de.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\glf536c.tmp Synchronize,Write Attributes
c:\users\user\appdata\local\temp\glf536c.tmp Synchronize,Write Data
Show More
c:\users\user\appdata\local\temp\glf538d.tmp Synchronize,Write Attributes
c:\users\user\appdata\local\temp\glf538d.tmp Synchronize,Write Data
c:\users\user\appdata\local\temp\glf538e.tmp Synchronize,Write Attributes
c:\users\user\appdata\local\temp\glf538e.tmp Synchronize,Write Data
c:\users\user\appdata\local\temp\glfb2e4.tmp Synchronize,Write Attributes
c:\users\user\appdata\local\temp\glfb2e4.tmp Synchronize,Write Data
c:\users\user\appdata\local\temp\glfb788.tmp Synchronize,Write Attributes
c:\users\user\appdata\local\temp\glfb788.tmp Synchronize,Write Data
c:\users\user\appdata\local\temp\glff756.tmp Synchronize,Write Attributes
c:\users\user\appdata\local\temp\glff756.tmp Synchronize,Write Data
c:\users\user\appdata\local\temp\glff7a5.tmp Synchronize,Write Attributes
c:\users\user\appdata\local\temp\glff7a5.tmp Synchronize,Write Data
c:\users\user\appdata\local\temp\glff7b6.tmp Synchronize,Write Attributes
c:\users\user\appdata\local\temp\glff7b6.tmp Synchronize,Write Data
c:\users\user\appdata\local\temp\glg532d.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\glgf726.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\glkac68.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\glmae8c.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\glmf31d.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\~glh0000.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\~glh0001.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\~glh0002.tmp Generic Write,Read Attributes
c:\windows\syswow64\glbsinst.%$d Generic Write,Read Attributes
c:\~glhttp1.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data

Windows API Usage

Category API
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
Anti Debug
  • IsDebuggerPresent
  • NtQuerySystemInformation
User Data Access
  • GetUserObjectInformation
Network Winsock2
  • WSAStartup
Network Wininet
  • HttpQueryInfo
  • InternetOpen
  • InternetOpenUrl
Network Winsock
  • gethostbyname
  • inet_addr

Shell Command Execution

C:\Users\Ezeweyrd\AppData\Local\Temp\GLB4D20.tmp C:\Users\Ezeweyrd\AppData\Local\Temp\GLB4D20.tmp 4736 c:\users\user\DOWNLO~1\BD7B38~1
C:\Users\Qmvtumul\AppData\Local\Temp\GLBAA83.tmp C:\Users\Qmvtumul\AppData\Local\Temp\GLBAA83.tmp 4736 c:\users\user\DOWNLO~1\86BAE1~1
C:\Users\Xcivgsfz\AppData\Local\Temp\GLBF147.tmp C:\Users\Xcivgsfz\AppData\Local\Temp\GLBF147.tmp 4736 c:\users\user\DOWNLO~1\9F0EAD~1

Related Posts

Trending

Most Viewed

Loading...