Threat Database Adware Adware.SmartApps

Adware.SmartApps

By CagedTech in Adware

Threat Scorecard

Popularity Rank: 26,362
Threat Level: 20 % (Normal)
Infected Computers: 9
First Seen: October 10, 2022
Last Seen: January 22, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Adware.SmartApps
Signature status: No Signature

Known Samples

MD5: 0fceb24073fc933036a8d2b79a24ba74
SHA1: b17f05888031d48c6e64b07c077a11ba22144703
SHA256: A76F12DFAD2B705FD342C994D3EABEB13E52A34E4BDF4BE3FFB64C16BA745626
File Size: 192.35 KB, 192346 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
Show More
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Company Name Gratifying Apps
Product Name Discount Dragon
Product Version 1.0.0.0

Files Modified

File Attributes
c:\users\user\appdata\local\temp\nstb766.tmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsyb6e8.tmp\buttonevent.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsyb6e8.tmp\captcha.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsyb6e8.tmp\md5dll.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsyb6e8.tmp\modern-wizard.bmp Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsyb6e8.tmp\modern-wizard.bmp Synchronize,Write Attributes
c:\users\user\appdata\local\temp\nsyb6e8.tmp\nsdialogs.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsyb6e8.tmp\nsdownloadcv.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsyb6e8.tmp\nsjson.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsyb6e8.tmp\ping.js Generic Write,Read Attributes
Show More
c:\users\user\appdata\local\temp\nsyb6e8.tmp\system.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\~nsu.tmp\au_.exe Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144

Registry Modifications

Key::Value Data API Name
HKLM\system\controlset001\control\session manager::pendingfilerenameoperations *1\??\C:\Windows\SystemTemp\MicrosoftEdgeUpdate.exe.old122e4*1\??\C:\Windows\SystemTemp\CopilotUpdate.exe.old12352*1\??\C:\P RegNtPreCreateKey
HKLM\system\controlset001\control\session manager::pendingfilerenameoperations *1\??\C:\Windows\SystemTemp\MicrosoftEdgeUpdate.exe.old122e4*1\??\C:\Windows\SystemTemp\CopilotUpdate.exe.old12352*1\??\C:\P RegNtPreCreateKey
HKLM\software\wow6432node\discount dragon::systemid RegNtPreCreateKey
HKLM\software\wow6432node\advertisingsupport::systemid RegNtPreCreateKey

Windows API Usage

Category API
Process Shell Execute
  • CreateProcess
Network Winsock2
  • WSAStartup
Network Winsock
  • closesocket
  • gethostbyname
  • inet_addr
  • socket

Shell Command Execution

"C:\Users\Andetktd\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=c:\users\user\downloads\

Related Posts

Trending

Most Viewed

Loading...