Threat Database Adware Adware.Adposhel.RA

Adware.Adposhel.RA

By CagedTech in Adware

Threat Scorecard

Popularity Rank: 9,285
Threat Level: 20 % (Normal)
Infected Computers: 67
First Seen: March 7, 2024
Last Seen: October 24, 2025
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Adware.Adposhel.RA
Signature status: No Signature

Known Samples

MD5: 664b8a3477125f4863ead4c53c9637d3
SHA1: 96ba1109cb26cafbb5de8c71f91660db39c18709
SHA256: 3BD168CF5A45771DAAC6794651B00331A54E1DE96E32DD70076B1D90BD716A40
File Size: 1.18 MB, 1181887 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have security information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
Show More
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
File Description Clickteam Fusion Application Runtime
File Version 3, 0, 291, 5
Internal Name lnchrt.exe
Legal Copyright Copyright © 2006-2015 Clickteam
Original Filename lnchrt.exe
Product Name Clickteam Fusion Application Runtime
Product Version 3, 0, 291, 5

File Traits

  • big overlay
  • HighEntropy
  • x86

Block Information

Total Blocks: 327
Potentially Malicious Blocks: 34
Whitelisted Blocks: 293
Unknown Blocks: 0

Visual Map

x x x x x x x x 0 x x x x x x 0 x 0 x x x x 0 x 0 x 0 x 0 x x 0 0 0 0 0 x 0 x x x 0 0 x x 0 0 0 x 0 x x x 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 2 3 0 0 1 0 0 0 1 0 0 1 0 0 0 1 0 0 1 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 2 1 0 0 1 0 1 0 0 0 0 0 1 0 1 1 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Files Modified

File Attributes
c:\users\user\appdata\local\temp\mrt4552.tmp\ctrlx.mfx Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\mrt4552.tmp\joystick2.mfx Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\mrt4552.tmp\kcbutton.mfx Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\mrt4552.tmp\kcbutton.txt Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\mrt4552.tmp\kcedit.mfx Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\mrt4552.tmp\kcedit.txt Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\mrt4552.tmp\kcini.mfx Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\mrt4552.tmp\kcini.txt Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\mrt4552.tmp\mmfs2.dll Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\mrt4552.tmp\mmfs2.txt Generic Read,Write Data,Write Attributes,Write extended,Append data
Show More
c:\users\user\appdata\local\temp\mrt4552.tmp\statictext.mfx Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\mrt4552.tmp\statictext.txt Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\mrt4552.tmp\stdrt.exe Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\mrt4552.tmp\stdrt.txt Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\mrt4552.tmp\waveflt.sft Generic Read,Write Data,Write Attributes,Write extended,Append data

Registry Modifications

Key::Value Data API Name
HKCU\system\currentcontrolset\control\mediaproperties\privateproperties\directinput\vid_0627&pid_0001\calibration\0::guid 蹐〟駿ᇰƀ䕄呓 RegNtPreCreateKey
HKCU\software\microsoft\directinput\stdrt.exe5b2b530600105a00::name STDRT.EXE RegNtPreCreateKey
HKCU\software\microsoft\directinput\stdrt.exe5b2b530600105a00::usesmapper RegNtPreCreateKey
HKCU\software\microsoft\directinput\mostrecentapplication::name STDRT.EXE RegNtPreCreateKey
HKCU\software\microsoft\directinput\mostrecentapplication::id STDRT.EXE5B2B530600105A00 RegNtPreCreateKey
HKCU\software\microsoft\directinput\mostrecentapplication::version RegNtPreCreateKey
HKCU\software\microsoft\directinput\mostrecentapplication::mostrecentstart 雁黖⹆ǜ RegNtPreCreateKey
HKCU\software\microsoft\directinput\mostrecentapplication::version Ԋ RegNtPreCreateKey
HKCU\software\microsoft\directinput\mostrecentapplication::name STDRT.EXE RegNtPreCreateKey
HKCU\software\microsoft\directinput\mostrecentapplication::id STDRT.EXE5B2B530600105A00 RegNtPreCreateKey
Show More
HKCU\software\microsoft\directinput\mostrecentapplication::mostrecentstart 낏黜⹆ǜ RegNtPreCreateKey

Windows API Usage

Category API
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
Anti Debug
  • IsDebuggerPresent
User Data Access
  • GetUserObjectInformation
Other Suspicious
  • SetWindowsHookEx
Keyboard Access
  • GetAsyncKeyState

Shell Command Execution

"C:\Users\Hxtavgdv\AppData\Local\Temp\mrt4552.tmp\stdrt.exe" /SF "c:\users\user\downloads\96ba1109cb26cafbb5de8c71f91660db39c18709_0001181887" /SO394240

Trending

Most Viewed

Loading...