Adware.Multiplug.J
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Popularity Rank: | 7,644 |
| Threat Level: | 20 % (Normal) |
| Infected Computers: | 1,314 |
| First Seen: | September 2, 2021 |
| Last Seen: | April 6, 2026 |
| OS(es) Affected: | Windows |
Table of Contents
Analysis Report
General information
| Family Name: | Adware.Multiplug.J |
|---|---|
| Signature status: | Modified signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
435fec0540cfd8a13dad0dc4b5b7f6b4
SHA1:
541813c8dbbbcd0071e53eea41ce010184dfb244
SHA256:
8C3D30A8C30C4935E5C0E64CB7244C4FCFE96407A6C604F5235FD4917CA82FB2
File Size:
906.44 KB, 906440 bytes
|
|
MD5:
bae9e718248508452f7e0c8a088efbd5
SHA1:
93486c2d3dd0c4393ed402b21538421a0c30a478
SHA256:
F5FBFC731E0274B82A497B59504F81EC6F848CF3373694AD19F7D30DC5CC3277
File Size:
301.49 KB, 301488 bytes
|
|
MD5:
270c122ea18aa776c323ed5e03e44d81
SHA1:
2dd46193aebc67d5d34277710c0c4c24c49077a5
SHA256:
7EBDCFD534D25844F7D2E27190B670D3A0328ECE98EBB6049DF500DF2FCD9564
File Size:
7.41 MB, 7408752 bytes
|
|
MD5:
98102de4ac25b6735a23e28689111fa3
SHA1:
b7e5276ad9a03edd04e6ecd09cea04048fff40fb
SHA256:
05A1658905C93C0EF33BEB84EFDC686D3806D6AD0B0463FCD836D18F847C5646
File Size:
323.21 KB, 323208 bytes
|
|
MD5:
3ef46f5d8311aca445d346490bda2dcd
SHA1:
7c7ce85f9cdf3d175dd46c0c95f2de7d8e370992
SHA256:
1B55735978FC4C7BB115C0BDE0C2C3E30AD57EA8788168C77CA671E62FA5333C
File Size:
513.02 KB, 513024 bytes
|
Show More
|
MD5:
defd9ec5142156367279da312d0bd23d
SHA1:
d38ea794ce8f6a28bf9b16c4627b883712b5c00e
SHA256:
360AEF85D68FF19951808C316A50144801EF0D0E521E7C464654463975673F34
File Size:
296.70 KB, 296704 bytes
|
|
MD5:
c8b14fb112e099d0f9ba153314656b37
SHA1:
665db5aaa80ec2ad40c324f4372e92b8033b11b6
SHA256:
B0BFA47543F8B37A95CC0F3622017B055A8AA1809C2FD72FFD7096BF33D3DB99
File Size:
297.66 KB, 297664 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have exports table
- File doesn't have security information
- File is 32-bit executable
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Arguments | /x |
| Comments |
|
| Company Name |
|
|
|
| File Description |
|
| File Version |
|
| Internal Name | TSULoader |
| Legal Copyright |
|
| Original Filename | TSULoader.exe |
| Package Code |
|
| Product Code |
|
| Product Name |
|
| Product Version |
|
| Web Site |
|
Digital Signatures
Digital Signatures
This section lists digital signatures that are attached to samples within this family. When analyzing and verifying digital signatures, it is important to confirm that the signature’s root authority is a well-known and trustworthy entity and that the status of the signature is good. Malware is often signed with non-trustworthy “Self Signed” digital signatures (which can be easily created by a malware author with no verification). Malware may also be signed by legitimate signatures that have an invalid status, and by signatures from questionable root authorities with fake or misleading “Signer” names.| Signer | Root | Status |
|---|---|---|
| BillP Studios | AddTrust External CA Root | Hash Mismatch |
| Rikoooo Simulation | Rikoooo Simulation | Self Signed |
File Traits
- HighEntropy
- Installer Manifest
- Installer Version
- x86
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 27 |
|---|---|
| Potentially Malicious Blocks: | 8 |
| Whitelisted Blocks: | 19 |
| Unknown Blocks: | 0 |
Visual Map
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- Brute.DD
- Multiplug.J
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| c:\users\user\appdata\local\temp\2dd46193aebc67d5d34277710c0c4c24c49077a5_0007408752.log | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\39f456c6.dat | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\39f456c6.dat | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\39f456c6\_setup.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\39f456c6\_setup.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\39f456c6\readme.txt | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\39f456c6\readme.txt | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\39f456c6\setup.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\39f456c6\setup.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\39f456c6\setup.ico | Generic Write,Read Attributes |
Show More
| c:\users\user\appdata\local\temp\39f456c6\setup.ico | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\541813c8dbbbcd0071e53eea41ce010184dfb244_0000906440.log | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\665db5aaa80ec2ad40c324f4372e92b8033b11b6_0000297664.log | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\7c7ce85f9cdf3d175dd46c0c95f2de7d8e370992_0000513024.log | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\93486c2d3dd0c4393ed402b21538421a0c30a478_0000301488.log | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\9a0ee864.dat | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\9a0ee864.dat | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\9a0ee864\_setup.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\9a0ee864\_setup.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\9a0ee864\setup.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\9a0ee864\setup.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\9a0ee864\setup.ico | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\9a0ee864\setup.ico | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\a0e5becc.dat | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\a0e5becc.dat | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\a0e5becc\_setup.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\a0e5becc\_setup.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\a0e5becc\readme.txt | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\a0e5becc\readme.txt | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\a0e5becc\setup.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\a0e5becc\setup.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\a0e5becc\setup.ico | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\a0e5becc\setup.ico | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\b7e5276ad9a03edd04e6ecd09cea04048fff40fb_0000323208.log | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\c4007a36.dat | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\c4007a36.dat | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\d38ea794ce8f6a28bf9b16c4627b883712b5c00e_0000296704.log | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\e1a9cbae.dat | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\e1a9cbae.dat | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\edb2160c.dat | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\edb2160c.dat | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\f83929b2.dat | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\f83929b2.dat | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\tsu-15c0.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\tsu-15c0.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\tsu-1b1c.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\tsu-1b1c.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\tsu14226d7e.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\tsu14226d7e.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\tsu97adab2d.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\tsu97adab2d.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\tsub82a4529.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\tsub82a4529.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\tsube747b71.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\tsube747b71.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\tsuf548bf2b.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\tsuf548bf2b.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\{06f8ae38-0fa4-4239-a0d2-4786dd1b8cce}\_setup.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\{06f8ae38-0fa4-4239-a0d2-4786dd1b8cce}\_setup.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\{06f8ae38-0fa4-4239-a0d2-4786dd1b8cce}\custom.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\{06f8ae38-0fa4-4239-a0d2-4786dd1b8cce}\custom.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\{06f8ae38-0fa4-4239-a0d2-4786dd1b8cce}\readme.txt | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\{06f8ae38-0fa4-4239-a0d2-4786dd1b8cce}\readme.txt | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\{06f8ae38-0fa4-4239-a0d2-4786dd1b8cce}\setup.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\{06f8ae38-0fa4-4239-a0d2-4786dd1b8cce}\setup.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\{06f8ae38-0fa4-4239-a0d2-4786dd1b8cce}\setup.ico | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\{06f8ae38-0fa4-4239-a0d2-4786dd1b8cce}\setup.ico | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\{3bd77441-8ce2-c555-f3ac-88df3ffb853c}\_setup.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\{3bd77441-8ce2-c555-f3ac-88df3ffb853c}\_setup.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\{3bd77441-8ce2-c555-f3ac-88df3ffb853c}\_setupx.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\{3bd77441-8ce2-c555-f3ac-88df3ffb853c}\_setupx.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\{3bd77441-8ce2-c555-f3ac-88df3ffb853c}\setup.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\{3bd77441-8ce2-c555-f3ac-88df3ffb853c}\setup.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\{3bd77441-8ce2-c555-f3ac-88df3ffb853c}\setup.ico | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\{3bd77441-8ce2-c555-f3ac-88df3ffb853c}\setup.ico | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\{cbd8102b-c1ec-57cc-6135-c5d1cff4e156}\_setup.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\{cbd8102b-c1ec-57cc-6135-c5d1cff4e156}\_setup.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\{cbd8102b-c1ec-57cc-6135-c5d1cff4e156}\_setupx.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\{cbd8102b-c1ec-57cc-6135-c5d1cff4e156}\_setupx.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\{cbd8102b-c1ec-57cc-6135-c5d1cff4e156}\setup.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\{cbd8102b-c1ec-57cc-6135-c5d1cff4e156}\setup.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\{cbd8102b-c1ec-57cc-6135-c5d1cff4e156}\setup.ico | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\{cbd8102b-c1ec-57cc-6135-c5d1cff4e156}\setup.ico | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\{e7421af6-1602-4334-a1df-5e203ca13800}\_setup.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\{e7421af6-1602-4334-a1df-5e203ca13800}\_setup.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\{e7421af6-1602-4334-a1df-5e203ca13800}\custom.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\{e7421af6-1602-4334-a1df-5e203ca13800}\custom.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\{e7421af6-1602-4334-a1df-5e203ca13800}\readme.txt | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\{e7421af6-1602-4334-a1df-5e203ca13800}\readme.txt | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\{e7421af6-1602-4334-a1df-5e203ca13800}\setup.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\{e7421af6-1602-4334-a1df-5e203ca13800}\setup.exe | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\{e7421af6-1602-4334-a1df-5e203ca13800}\setup.ico | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\{e7421af6-1602-4334-a1df-5e203ca13800}\setup.ico | Synchronize,Write Attributes |
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | Data | API Name |
|---|---|---|
| HKCU\software\microsoft\windows\currentversion\internet settings::receivetimeout | ⟀ | RegNtPreCreateKey |
| HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\content::cacheprefix | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\cookies::cacheprefix | Cookie: | RegNtPreCreateKey |
| HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\history::cacheprefix | Visited: | RegNtPreCreateKey |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::proxybypass | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::intranetname | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::uncasintranet | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::autodetect | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Service Control |
|
| User Data Access |
|
| Network Wininet |
|
| Network Info Queried |
|