Threat Database Adware Adware.RegistrySmart

Adware.RegistrySmart

By CagedTech in Adware

Threat Scorecard

Popularity Rank: 23,125
Threat Level: 20 % (Normal)
Infected Computers: 8
First Seen: July 24, 2009
Last Seen: January 15, 2026
OS(es) Affected: Windows

Aliases

2 security vendors flagged this file as malicious.

Antivirus Vendor Detection
NOD32 Win32/Adware.RegistrySmart
Fortinet Misc/PUP

SpyHunter Detects & Remove Adware.RegistrySmart

File System Details

Adware.RegistrySmart may create the following file(s):
# File Name MD5 Detections
1. RegClean.exe 158318749961910e631fe32ec3099199 0

Analysis Report

General information

Family Name: Adware.RegistrySmart
Signature status: No Signature

Known Samples

MD5: c7ca4eae9ba8634da02a6cbd250e5c0c
SHA1: facf98b932b81d0ba1c00614663ab244142bca79
SHA256: 4C667E9BF609F318F63DEF9E70CBF0DC3E764B9F0B9E2BDBFC9D533416A6B229
File Size: 2.46 MB, 2458757 bytes
MD5: 0c111b1b9ad0a2fb6c08fd330b1d0204
SHA1: 713f519a58b82027899045590edd513b3adcd2cb
SHA256: 04344681A7A27524F322FD1E78BFB54B1D6404B47E8B0122267CBFFA695E7181
File Size: 2.46 MB, 2459328 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File has TLS information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
Show More
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Comments This installation was built with Inno Setup: http://www.innosetup.com
Company Name RegistrySmart
File Description RegistrySmart Setup
Legal Copyright Copyright 2005, All rights reserved.

File Traits

  • Inno
  • InnoSetup Installer
  • Installer Manifest
  • Installer Version
  • x86

Files Modified

File Attributes
\device\namedpipe\gmdasllogger Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-4cnhf.tmp\_isetup\_regdll.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\is-4cnhf.tmp\_isetup\_setup64.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\is-4cnhf.tmp\_isetup\_shfoldr.dll Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\is-ea6js.tmp\is-7n6d9.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-j59lm.tmp\_isetup\_regdll.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\is-j59lm.tmp\_isetup\_setup64.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\is-j59lm.tmp\_isetup\_shfoldr.dll Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\is-tuko9.tmp\is-euq3a.tmp Generic Write,Read Attributes

Windows API Usage

Category API
Anti Debug
  • IsDebuggerPresent
User Data Access
  • GetUserObjectInformation
Process Manipulation Evasion
  • NtUnmapViewOfSection
  • ReadProcessMemory
Process Shell Execute
  • CreateProcess

Shell Command Execution

"C:\Users\Xfcsxvsb\AppData\Local\Temp\is-EA6JS.tmp\is-7N6D9.tmp" /SL4 $6033C "c:\users\user\downloads\facf98b932b81d0ba1c00614663ab244142bca79_0002458757" 2149993 54784
"C:\Users\Iomdokci\AppData\Local\Temp\is-TUKO9.tmp\is-EUQ3A.tmp" /SL4 $A001E "c:\users\user\downloads\713f519a58b82027899045590edd513b3adcd2cb_0002459328" 2150442 54784

Trending

Most Viewed

Loading...