Threat Database Adware Adware.Duckplay

Adware.Duckplay

By CagedTech in Adware

Threat Scorecard

Threat Level: 20 % (Normal)
Infected Computers: 46
First Seen: December 16, 2012
Last Seen: April 23, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Adware.Duckplay
Signature status: Modified signature

Known Samples

MD5: 9057134688d2519e969f5ab3420dd3c1
SHA1: 61df806b7bb7820f8f4784f79a26abc70c2e80c8
SHA256: AABD6A16A8FFE5456635B8867BC7E9944C32F5DACCB50AC1061E9BB03350BB69
File Size: 891.53 KB, 891528 bytes
MD5: b3b940479b0a527c9832da3d5a3de904
SHA1: fbf82e6597be7d660677f67a16440dbcacf208f3
SHA256: 50A470FF9644128F02A817A68081BD1908BE35D017C714E44EAEFD90AF289BE9
File Size: 1.06 MB, 1057920 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File has TLS information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Comments This installation was built with Inno Setup.
File Description My Program Setup
Product Name My Program
Product Version 1.5

Digital Signatures

Signer Root Status
Duck Play, LLC. VeriSign Class 3 Code Signing 2010 CA Self Signed

Block Information

Total Blocks: 257
Potentially Malicious Blocks: 31
Whitelisted Blocks: 61
Unknown Blocks: 165

Visual Map

0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? x ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? x ? ? ? ? ? ? ? ? ? ? ? x ? ? ? ? ? ? ? ? ? ? 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? x ? ? ? ? 0 ? x ? ? ? ? ? ? ? ? ? ? x ? ? 0 ? ? ? ? ? ? 0 ? ? ? ? x ? x 0 ? ? x ? ? ? ? ? ? ? ? ? ? ? 0 ? ? ? ? ? ? ? ? ? x ? ? 0 ? x 0 ? 0 ? ? ? x ? ? ? ? x ? x ? ? ? ? ? ? ? ? ? ? ? 0 ? ? x x ? ? x ? ? x x x ? ? 0 x 0 ? ? x x 0 0 x 0 ? x x x 0 x x 0 ? 0 0 0 0 ? ? 0 x 0 x ?
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Files Modified

File Attributes
c:\users\user\appdata\local\temp\is-btedo.tmp\61df806b7bb7820f8f4784f79a26abc70c2e80c8_0000891528.tmp Generic Write,Read Attributes
c:\users\user\downloads\temp\shsandbox-win32.dll-5.22.8.9999-x86.dmp Generic Read,Write Data,Write Attributes,Write extended,Append data

Windows API Usage

Category API
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess

Shell Command Execution

"C:\Users\Ixwaqtam\AppData\Local\Temp\is-BTEDO.tmp\61df806b7bb7820f8f4784f79a26abc70c2e80c8_0000891528.tmp" /SL5="$4034A,850647,54272,c:\users\user\downloads\61df806b7bb7820f8f4784f79a26abc70c2e80c8_0000891528"

Trending

Most Viewed

Loading...