Threat Database Adware Adware.Similagro.B

Adware.Similagro.B

By CagedTech in Adware

Threat Scorecard

Popularity Rank: 18,692
Threat Level: 20 % (Normal)
Infected Computers: 11
First Seen: July 20, 2023
Last Seen: March 9, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Adware.Similagro.B
Signature status: No Signature

Known Samples

MD5: 28c82ded54868dee8189bb0ec37d0b18
SHA1: c206be24dd6fed824178b8599fb66de44ca7b17e
SHA256: 877EEA3617CF2F2C886A810996D3659711916194B30F60A7CC5A04F121A6C387
File Size: 112.97 KB, 112965 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Company Name WebsitesList
File Version 1.0.2.11
Product Name WebsitesList
Product Version 1.0.2.11

File Traits

  • dll
  • HighEntropy
  • x86

Files Modified

File Attributes
\device\namedpipe\gmdasllogger Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nshbf9e.tmp Synchronize,Write Attributes
c:\users\user\appdata\local\temp\nswbf10.tmp Synchronize,Write Attributes
c:\users\user\appdata\local\temp\nswbf10.tmp\safed.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nswbf10.tmp\safed.dll Synchronize,Write Attributes
c:\users\user\appdata\local\temp\nswbf10.tmp\system.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nswbf10.tmp\system.dll Synchronize,Write Attributes
c:\windows\appcompat\programs\amcache.hve Read Data,Read Control,Write Data
c:\windows\appcompat\programs\amcache.hve Write Attributes

Registry Modifications

Key::Value Data API Name
HKLM\system\controlset001\control\session manager::pendingfilerenameoperations *1\??\C:\Windows\SystemTemp\MicrosoftEdgeUpdate.exe.old5af52*1\??\C:\Windows\SystemTemp\CopilotUpdate.exe.old5af62*1\??\C:\P RegNtPreCreateKey

Windows API Usage

Category API
Process Manipulation Evasion
  • ReadProcessMemory
Anti Debug
  • IsDebuggerPresent
User Data Access
  • GetUserObjectInformation
Network Winhttp
  • WinHttpConnect
  • WinHttpOpen
  • WinHttpOpenRequest
  • WinHttpSendRequest
Process Shell Execute
  • CreateProcess

Shell Command Execution

"C:\Users\Uokgwzzg\AppData\Local\Temp\nshBF9E.tmp" /S /dnk= /pid=45A0FDE4-F89B-40A1-AAEF-91B6EF617548 /src=

Trending

Most Viewed

Loading...