Threat Database Adware Adware Generic 5.CDUL

Adware Generic 5.CDUL

By CagedTech in Adware

Threat Scorecard

Popularity Rank: 2,981
Threat Level: 20 % (Normal)
Infected Computers: 1,034
First Seen: December 30, 2014
Last Seen: January 27, 2026
OS(es) Affected: Windows

Adware Generic 5.CDUL is a resourceful adware threat that may be distributed by spam emails, compromised websites or bundled with free programs. After being installed on a computer, Adware Generic 5.CDUL may modify some of your Registry settings and create numerous harmful files. By exploiting security breaches, Adware Generic 5.CDUL may enable the entrance of other threats on the affected computer. Adware Generic 5.CDUL also may interfere with your installed programs in order to avoid detection. It is a wise move to scan your system as soon as you notice a different behavior such as poor performance, slowed speed or crashes. It may be caused by threats such as Adware Generic 5.CDUL. Adware Generic 5.CDUL should be removed upon detection in order to avoid further harm.

Analysis Report

General information

Family Name: Adware.Superweb.D
Signature status: No Signature

Known Samples

MD5: c8e8cb3c3d4ede2c432191c8c461fa8b
SHA1: 36d63baeb097098f499805c8bab45b7be50aa222
SHA256: DD2A4FE47F92BB0CD2AA5D58517C68F88868826CEE1E0EEB13BA04F7E4C2DF26
File Size: 112.64 KB, 112640 bytes
MD5: 0715582c4016eb24bd9c70cd486bf7e7
SHA1: 343d1a3c810889e3a5e56c789f15f4d1f03d5d7c
SHA256: CEB13614915712A5F62B1FCEB56EBA6D37FE00A4920CDBE50FDB759A58227A95
File Size: 313.34 KB, 313344 bytes
MD5: 96a7080ec2a010270b786069bd92da0d
SHA1: 9c07f0db1baaedbba1dbc882f248530b3f05aae9
SHA256: 4C485185A309F9E8E35E40D8AEF8E1174B5CF45D02BDE65FD9ACEF87A725379D
File Size: 327.68 KB, 327680 bytes
MD5: 4ba4cd3d2d13afdd1a72238972a1dc50
SHA1: 8c27c41a0aef6e56f153f11b3728e966d3dc9a28
SHA256: E5B3DD2158BA7A29176D06F97CAF8CFC68AB10144FF57A318BFD14CECD64E626
File Size: 294.40 KB, 294400 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have security information
  • File has been packed
  • File has exports table
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

Windows PE Version Information

Name Value
Comments
  • Intel web components for Intel® Identity Protection Technology
  • Kserv Extra Module.
  • Kserv Module.
Company Name Intel Corporation
File Description
  • Intel web components for Intel® Identity Protection Technology
  • Kserv Extra Module
  • Kserv Module
File Open Name npIntelWebAPIipt-3-5
File Version
  • 13.1.1.0
  • 4.0.5.0
  • 3.3.0.0
Internal Name npIntelWebAPIipt-3-5
Legal Copyright
  • Copyright (c) 2005-2012 Juce, Robbie, Jenkey1002
  • Copyright (C) 2013 Intel Corporation
  • Copyright (c) 2013 Jenkey1002
M I M E Type application/x-vnd-intel-webapi-ipt-4.0.5
Original Filename npIntelWebAPIIPT
Product Name Intel® Identity Protection Technology
Product Version 4.0.5.0

Digital Signatures

Signer Root Status
Intel® Identity Protection Technology Software Equifax Secure Certificate Authority Hash Mismatch

File Traits

  • dll
  • HighEntropy
  • packed
  • x86

Block Information

Total Blocks: 751
Potentially Malicious Blocks: 1
Whitelisted Blocks: 634
Unknown Blocks: 116

Visual Map

0 0 ? ? ? ? ? ? 0 0 ? ? ? 0 0 0 ? ? ? ? 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 ? ? ? 0 0 0 0 0 ? 0 0 ? 0 0 ? ? 0 ? ? 0 0 ? 0 0 ? ? ? ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? 0 0 0 0 0 0 0 ? 0 ? 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? 0 0 0 0 ? ? ? ? ? ? ? ? ? ? ? 0 ? 0 ? ? ? 0 0 0 0 ? 0 0 ? ? ? ? ? ? ? 0 ? 0 ? ? ? ? ? 0 0 ? ? ? 0 ? 0 0 ? ? ? 0 ? ? ? ? ? ? ? 0 ? ? ? ? ? ? 0 0 ? 0 0 0 0 0 x 0 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? 0 ? ? ? ? 0 ? ? 2 0 0 1 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 1 0 0 1 1 0 1 0 0 1 0 0 1 0 0 0 1 2 0 0 1 0 0 0 1 1 0 0 1 0 1 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 2 3 0 1 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 2 2 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 1 1 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 1 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 ? ? 0 0 0 0
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtClose
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtQueryAttributesFile
Show More
  • ntdll.dll!NtQueryDebugFilterState
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationFile
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtSetInformationVirtualMemory
  • ntdll.dll!NtSetInformationWorkerFactory
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtTraceControl
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWriteFile
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
Anti Debug
  • NtQuerySystemInformation

Shell Command Execution

C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\36d63baeb097098f499805c8bab45b7be50aa222_0000112640.,LiQMAxHB
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\343d1a3c810889e3a5e56c789f15f4d1f03d5d7c_0000313344.,LiQMAxHB
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\9c07f0db1baaedbba1dbc882f248530b3f05aae9_0000327680.,LiQMAxHB
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\8c27c41a0aef6e56f153f11b3728e966d3dc9a28_0000294400.,LiQMAxHB

Trending

Most Viewed

Loading...