Threat Database Adware Adware.Uwamson.C

Adware.Uwamson.C

By CagedTech in Adware

Threat Scorecard

Popularity Rank: 8,343
Threat Level: 20 % (Normal)
Infected Computers: 1,247
First Seen: June 23, 2021
Last Seen: March 14, 2026
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Adware.Uwamson.C
Signature status: No Signature

Known Samples

MD5: 2a13d8b00bcb10cf8497e29eeb3344fe
SHA1: 647fb77eb4d134eee65e82c687e64fac76810047
File Size: 3.72 MB, 3722240 bytes
MD5: 33d31017deb411287a01ce2d41bfaee4
SHA1: e1c1ef7eafd545f2eb7b699f45fffef9252ee366
File Size: 4.69 MB, 4688896 bytes
MD5: 470d6672147c779311d9c34ec36a5dd7
SHA1: a623825e95d2ef05409df2c2b6debddd2d522086
File Size: 5.27 MB, 5270528 bytes
MD5: 84e26b427c152457756f1e6e83867926
SHA1: abb11ce511124e9e464957191ff299a01c2378aa
SHA256: 3E4AEE205F638673523C93921C5E12FD0427C231F48AF1F530FD82F8903F4898
File Size: 3.54 MB, 3540992 bytes
MD5: d342697975d7e4a5be852183ff55e2fe
SHA1: b7cdd02493003be142b656e4ca76a72f94086c7d
SHA256: CE8BA215A81CDFB935335EBF476766939E477499E3935CFACEB37F0EB904946A
File Size: 3.77 MB, 3770058 bytes
Show More
MD5: 813f7aac392b9a98a66000e145e45e52
SHA1: 53c7cbf66fdf312209cf02fffbcf54779b10900d
SHA256: 95B73ADC440C91530F7BA8CB72941DD6FC27CDBC884C57919617153A12FC538D
File Size: 6.00 MB, 5998080 bytes
MD5: becd432fe732fab523509c4ec0b73800
SHA1: e1bda32d5cc82e596e73a09791a53f4be04ebfd7
SHA256: CAD56CD5C6E631F3EF90B890470B21D4130FA031087D23286C3A71DDE418CB65
File Size: 4.78 MB, 4782080 bytes
MD5: a2b8fa90dc9b0513cc625f5ac1d3e8e8
SHA1: 0d12ad772d0b108fb4c02847aa04d03be21de9bb
SHA256: 28F8E44EF45428B535119E14C4BAE09A4F43C5A93F4430FF4127032F5DED9878
File Size: 3.64 MB, 3643392 bytes
MD5: 9d3ba1cad6ab47a0a62453a278de46f8
SHA1: f48c5d1e4295770dd7edf6dd074a385b4ca3b204
SHA256: F1605580368F545BB601DD2D53802DE02D2626513205B7FE62C5F80C0BB2F6B1
File Size: 3.53 MB, 3534848 bytes
MD5: 20bccac70f7554d0ce60a06b33e9bee8
SHA1: ed84497d9f2a59956946ebce842b5723d1a540bc
SHA256: 3DD4592E0335586AE562A207F43118AC8A428B7FD613275523679B3EE266E1DA
File Size: 5.00 MB, 5002240 bytes
MD5: 4234453c38f2133fd948e1490af501ae
SHA1: 08e9772204c05d036eb1031252ce3b5db8e8b9dc
SHA256: 99AC047567FE7FDA2BD8CD9C841569C24D696B20130092B935C26C3CD23D0285
File Size: 3.00 MB, 3001684 bytes
MD5: f5328b6e2833e1611ae779ae6be312d9
SHA1: e0ae0b75dd8cfbb438ea28b90a5d54b6a0c675ce
SHA256: F5F8FDB4BC171BD4C0719BBBBFCDB0FEAB737D3DC3A37D55B57FC35AC0427C56
File Size: 4.56 MB, 4564992 bytes
MD5: 81688c66178b96a654f5ce3e5cb9577e
SHA1: 1ca214a060ce491a30a644063c2c0f66008a04c7
SHA256: 8E10FCABC7D211A81FB793C5A143B2E744B692B565E9DEC0DDD5C65D76070FBF
File Size: 3.24 MB, 3236352 bytes
MD5: 43fa4f20fea6f906aca1d6fadf8afb40
SHA1: 8ccb4e28feba6b178b40648f29cce3d69a916af1
SHA256: 3C1115EC047D99B4EE06E2237953112C3205F4CBD6B1F711310245755A03BCAD
File Size: 3.64 MB, 3642880 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have security information
  • File has exports table
  • File has TLS information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
Show More
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Company Name Aocea - Helios Emu
File Description
  • Customizable Patcher for Ragnarök Online
  • Isekai Patcher
  • Thor Patcher
File Version
  • 2.6.4.13
  • 2.6.4.8
  • 2.5.4.18
Internal Name Stonegarlic
Legal Copyright
  • 2007-2014 Aeomin
  • 2007-2016 Aeomin
  • AED
Original Filename
  • Isekai.exe
  • Thor.exe
Product Name
  • Aeomin DLIB Core V4 Series
  • Thor Patcher
Product Version
  • 4.1.0
  • 2.6

File Traits

  • 2+ executable sections
  • big overlay
  • HighEntropy
  • VirtualQueryEx
  • x86

Block Information

Total Blocks: 7,401
Potentially Malicious Blocks: 1,357
Whitelisted Blocks: 6,044
Unknown Blocks: 0

Visual Map

0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
... Data truncated
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Delf.OD
  • Injector.JDA
  • InstallMonstr.H
  • Uwamson.C

Files Modified

File Attributes
\device\namedpipe Generic Read,Write Attributes
\device\namedpipe Generic Write,Read Attributes
\device\namedpipe\gmdasllogger Generic Write,Read Attributes
c:\users\user\appdata\local\temp\08e9772204c05d036eb1031252ce3b5db8e8b9dc_0003001684.madexcept\bugreport.txt Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\b7cdd02493003be142b656e4ca76a72f94086c7d_0003770058.madexcept\bugreport.txt Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\downloads\08e9772204c05d036eb1031252ce3b5db8e8b9dc_0003001684 Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\downloads\b7cdd02493003be142b656e4ca76a72f94086c7d_0003770058 Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\downloads\thorneedle2643980 Generic Read,Generic Execute,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 786496
c:\users\user\downloads\thorneedle320402 Generic Read,Generic Execute,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 786496
c:\users\user\downloads\thorneedle5255384 Generic Read,Generic Execute,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 786496
Show More
c:\users\user\downloads\thorneedle7542900 Generic Read,Generic Execute,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 786496
c:\users\user\downloads\thorneedle7627634 Generic Read,Generic Execute,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 786496
c:\users\user\downloads\tlk.dat Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\downloads\tlk.dat-journal Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\downloads\updated.dat Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\downloads\updated.dat-journal Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\windows\inf\machine.pnf Generic Write,Read Attributes

Windows API Usage

Category API
Network Winsock2
  • WSAStartup
  • WSAttemptAutodialName
Encryption Used
  • CryptAcquireContext
User Data Access
  • GetComputerName
  • GetUserName
  • GetUserObjectInformation
Network Winsock
  • bind
  • connect
  • freeaddrinfo
  • getaddrinfo
  • gethostbyname
  • gethostname
  • getnameinfo
  • getpeername
  • getsockname
  • inet_addr
Show More
  • send
  • setsockopt
  • socket
Anti Debug
  • NtQuerySystemInformation
Other Suspicious
  • SetWindowsHookEx
Network Winhttp
  • WinHttpOpen
Network Wininet
  • InternetQueryOption

Trending

Most Viewed

Loading...