Threat Database Adware Adware.Linkzb.A

Adware.Linkzb.A

By CagedTech in Adware

Threat Scorecard

Popularity Rank: 2,682
Threat Level: 20 % (Normal)
Infected Computers: 12,541
First Seen: February 23, 2022
Last Seen: February 24, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Adware.Linkzb.A
Signature status: Hash Mismatch

Known Samples

MD5: b4b3204cf20a656b59013c511a4ea359
SHA1: 79ec7c2d17620195da56a91278a33c99c98d610d
SHA256: 93828ACA7F594A0D97E71820DAB410F1E242362E9D889A9FD701F6C361AD7E69
File Size: 163.05 KB, 163048 bytes
MD5: 861095c32516dae045c8c5ee8898b0ad
SHA1: c28a960f5182e765a2fdea7840ecddf22167d869
SHA256: E046DDCCC790A99A4C44C990018CD67924839D8F921DD7ED10E6223F22823F5B
File Size: 4.03 MB, 4027752 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File has TLS information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Comments This installation was built with Inno Setup.
Company Name Zbshareware Lab
File Description USB Disk Security Setup
File Version 6.5.0.0
Product Name USB Disk Security
Product Version 6.5.0.0

Digital Signatures

Signer Root Status
Lanzhou Itanium Software Technology Co., Ltd. AddTrust External CA Root Hash Mismatch

File Traits

  • 2+ executable sections
  • No Version Info
  • SusSec
  • x86

Files Modified

File Attributes
c:\users\user\appdata\local\temp\is-j2dpn.tmp\c28a960f5182e765a2fdea7840ecddf22167d869_0004027752.tmp Generic Write,Read Attributes

Windows API Usage

Category API
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
User Data Access
  • GetUserObjectInformation

Shell Command Execution

"C:\Users\Cfauvgog\AppData\Local\Temp\is-J2DPN.tmp\c28a960f5182e765a2fdea7840ecddf22167d869_0004027752.tmp" /SL5="$30368,3545079,124416,c:\users\user\downloads\c28a960f5182e765a2fdea7840ecddf22167d869_0004027752"

Trending

Most Viewed

Loading...