Threat Database Adware Adware.InstallMonetizer.F

Adware.InstallMonetizer.F

By CagedTech in Adware

Threat Scorecard

Popularity Rank: 15,286
Threat Level: 20 % (Normal)
Infected Computers: 116
First Seen: October 22, 2022
Last Seen: January 2, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Adware.InstallMonetizer.F
Signature status: No Signature

Known Samples

MD5: 3d27f1539c66d03bb1c4411a31ac5bee
SHA1: c28b9138832198447c92ae2ef724d9e207ef9eb8
SHA256: B2C3F646855F08D8F960451C6F4ED601F676A08D657CA3F8FEFFF39ED5D79F42
File Size: 1.28 MB, 1278455 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Company Name iba AG
File Description ibaCapture-HMI installer
File Version 2.1.0
Legal Copyright Copyright © 2006 iba AG
Product Name ibaCapture-HMI

File Traits

  • dll
  • x86

Files Modified

File Attributes
\device\namedpipe\gmdasllogger Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsr18f3.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete
c:\users\user\appdata\local\temp\nsw1961.tmp Synchronize,Write Attributes
c:\users\user\appdata\local\temp\nsw1961.tmp\iospecial.ini Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\nsw1961.tmp\iospecial.ini Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsw1961.tmp\iospecial.ini Synchronize,Write Attributes
c:\users\user\appdata\local\temp\nsw1961.tmp\modern-header.bmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsw1961.tmp\modern-header.bmp Synchronize,Write Attributes
c:\users\user\appdata\local\temp\nsw1961.tmp\modern-wizard.bmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsw1961.tmp\modern-wizard.bmp Synchronize,Write Attributes

Registry Modifications

Key::Value Data API Name
HKLM\system\controlset001\control\session manager::pendingfilerenameoperations *1\??\C:\Windows\SystemTemp\MicrosoftEdgeUpdate.exe.old122e4*1\??\C:\Windows\SystemTemp\CopilotUpdate.exe.old12352*1\??\C:\P RegNtPreCreateKey
HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 RegNtPreCreateKey

Windows API Usage

Category API
Process Manipulation Evasion
  • ReadProcessMemory
Anti Debug
  • IsDebuggerPresent
User Data Access
  • GetUserObjectInformation

Trending

Most Viewed

Loading...