Adware.Uwamson.C
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Popularity Rank: | 8,343 |
| Threat Level: | 20 % (Normal) |
| Infected Computers: | 1,247 |
| First Seen: | June 23, 2021 |
| Last Seen: | March 14, 2026 |
| OS(es) Affected: | Windows |
Table of Contents
Analysis Report
General information
| Family Name: | Adware.Uwamson.C |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
2a13d8b00bcb10cf8497e29eeb3344fe
SHA1:
647fb77eb4d134eee65e82c687e64fac76810047
File Size:
3.72 MB, 3722240 bytes
|
|
MD5:
33d31017deb411287a01ce2d41bfaee4
SHA1:
e1c1ef7eafd545f2eb7b699f45fffef9252ee366
File Size:
4.69 MB, 4688896 bytes
|
|
MD5:
470d6672147c779311d9c34ec36a5dd7
SHA1:
a623825e95d2ef05409df2c2b6debddd2d522086
File Size:
5.27 MB, 5270528 bytes
|
|
MD5:
84e26b427c152457756f1e6e83867926
SHA1:
abb11ce511124e9e464957191ff299a01c2378aa
SHA256:
3E4AEE205F638673523C93921C5E12FD0427C231F48AF1F530FD82F8903F4898
File Size:
3.54 MB, 3540992 bytes
|
|
MD5:
d342697975d7e4a5be852183ff55e2fe
SHA1:
b7cdd02493003be142b656e4ca76a72f94086c7d
SHA256:
CE8BA215A81CDFB935335EBF476766939E477499E3935CFACEB37F0EB904946A
File Size:
3.77 MB, 3770058 bytes
|
Show More
|
MD5:
813f7aac392b9a98a66000e145e45e52
SHA1:
53c7cbf66fdf312209cf02fffbcf54779b10900d
SHA256:
95B73ADC440C91530F7BA8CB72941DD6FC27CDBC884C57919617153A12FC538D
File Size:
6.00 MB, 5998080 bytes
|
|
MD5:
becd432fe732fab523509c4ec0b73800
SHA1:
e1bda32d5cc82e596e73a09791a53f4be04ebfd7
SHA256:
CAD56CD5C6E631F3EF90B890470B21D4130FA031087D23286C3A71DDE418CB65
File Size:
4.78 MB, 4782080 bytes
|
|
MD5:
a2b8fa90dc9b0513cc625f5ac1d3e8e8
SHA1:
0d12ad772d0b108fb4c02847aa04d03be21de9bb
SHA256:
28F8E44EF45428B535119E14C4BAE09A4F43C5A93F4430FF4127032F5DED9878
File Size:
3.64 MB, 3643392 bytes
|
|
MD5:
9d3ba1cad6ab47a0a62453a278de46f8
SHA1:
f48c5d1e4295770dd7edf6dd074a385b4ca3b204
SHA256:
F1605580368F545BB601DD2D53802DE02D2626513205B7FE62C5F80C0BB2F6B1
File Size:
3.53 MB, 3534848 bytes
|
|
MD5:
20bccac70f7554d0ce60a06b33e9bee8
SHA1:
ed84497d9f2a59956946ebce842b5723d1a540bc
SHA256:
3DD4592E0335586AE562A207F43118AC8A428B7FD613275523679B3EE266E1DA
File Size:
5.00 MB, 5002240 bytes
|
|
MD5:
4234453c38f2133fd948e1490af501ae
SHA1:
08e9772204c05d036eb1031252ce3b5db8e8b9dc
SHA256:
99AC047567FE7FDA2BD8CD9C841569C24D696B20130092B935C26C3CD23D0285
File Size:
3.00 MB, 3001684 bytes
|
|
MD5:
f5328b6e2833e1611ae779ae6be312d9
SHA1:
e0ae0b75dd8cfbb438ea28b90a5d54b6a0c675ce
SHA256:
F5F8FDB4BC171BD4C0719BBBBFCDB0FEAB737D3DC3A37D55B57FC35AC0427C56
File Size:
4.56 MB, 4564992 bytes
|
|
MD5:
81688c66178b96a654f5ce3e5cb9577e
SHA1:
1ca214a060ce491a30a644063c2c0f66008a04c7
SHA256:
8E10FCABC7D211A81FB793C5A143B2E744B692B565E9DEC0DDD5C65D76070FBF
File Size:
3.24 MB, 3236352 bytes
|
|
MD5:
43fa4f20fea6f906aca1d6fadf8afb40
SHA1:
8ccb4e28feba6b178b40648f29cce3d69a916af1
SHA256:
3C1115EC047D99B4EE06E2237953112C3205F4CBD6B1F711310245755A03BCAD
File Size:
3.64 MB, 3642880 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have security information
- File has exports table
- File has TLS information
- File is 32-bit executable
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
Show More
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| Company Name | Aocea - Helios Emu |
| File Description |
|
| File Version |
|
| Internal Name | Stonegarlic |
| Legal Copyright |
|
| Original Filename |
|
| Product Name |
|
| Product Version |
|
File Traits
- 2+ executable sections
- big overlay
- HighEntropy
- VirtualQueryEx
- x86
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 7,401 |
|---|---|
| Potentially Malicious Blocks: | 1,357 |
| Whitelisted Blocks: | 6,044 |
| Unknown Blocks: | 0 |
Visual Map
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- Delf.OD
- Injector.JDA
- InstallMonstr.H
- Uwamson.C
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| \device\namedpipe | Generic Read,Write Attributes |
| \device\namedpipe | Generic Write,Read Attributes |
| \device\namedpipe\gmdasllogger | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\08e9772204c05d036eb1031252ce3b5db8e8b9dc_0003001684.madexcept\bugreport.txt | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\b7cdd02493003be142b656e4ca76a72f94086c7d_0003770058.madexcept\bugreport.txt | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\downloads\08e9772204c05d036eb1031252ce3b5db8e8b9dc_0003001684 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\downloads\b7cdd02493003be142b656e4ca76a72f94086c7d_0003770058 | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\downloads\thorneedle2643980 | Generic Read,Generic Execute,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 786496 |
| c:\users\user\downloads\thorneedle320402 | Generic Read,Generic Execute,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 786496 |
| c:\users\user\downloads\thorneedle5255384 | Generic Read,Generic Execute,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 786496 |
Show More
| c:\users\user\downloads\thorneedle7542900 | Generic Read,Generic Execute,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 786496 |
| c:\users\user\downloads\thorneedle7627634 | Generic Read,Generic Execute,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 786496 |
| c:\users\user\downloads\tlk.dat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\downloads\tlk.dat-journal | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\downloads\updated.dat | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\downloads\updated.dat-journal | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\windows\inf\machine.pnf | Generic Write,Read Attributes |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Network Winsock2 |
|
| Encryption Used |
|
| User Data Access |
|
| Network Winsock |
Show More
|
| Anti Debug |
|
| Other Suspicious |
|
| Network Winhttp |
|
| Network Wininet |
|