Threat Database Adware Adware.VrBrothers

Adware.VrBrothers

By CagedTech in Adware

Threat Scorecard

Popularity Rank: 4,476
Threat Level: 20 % (Normal)
Infected Computers: 4,463
First Seen: July 9, 2021
Last Seen: November 11, 2025
OS(es) Affected: Windows

Analysis Report

General information

Family Name: Adware.VrBrothers
Signature status: No Signature

Known Samples

MD5: cef55501c78cf408fe06a90ee4fffc5a
SHA1: d54c1eb370064276e27d1a3f971f71156b4c3c82
SHA256: 06D37EED79720F018FCC2B0CC5D75BC2D1AA559341F3A3BA3C709470FCBD54D1
File Size: 8.98 MB, 8979706 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File has TLS information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
Show More
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Comments This installation was built with Inno Setup.
File Description DeviceManager Setup
Product Name DeviceManager
Product Version v6.4.23.70.1

Files Modified

File Attributes
c:\users\user\appdata\local\temp\is-4jdid.tmp\_isetup\_setup64.tmp Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\is-4jdid.tmp\istask.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-4jdid.tmp\psvince.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\is-o58qd.tmp\d54c1eb370064276e27d1a3f971f71156b4c3c82_0008979706.tmp Generic Write,Read Attributes

Windows API Usage

Category API
Process Manipulation Evasion
  • NtUnmapViewOfSection
Process Shell Execute
  • CreateProcess
User Data Access
  • GetUserObjectInformation
Keyboard Access
  • GetKeyState

Shell Command Execution

"C:\Users\Qcpdhxmy\AppData\Local\Temp\is-O58QD.tmp\d54c1eb370064276e27d1a3f971f71156b4c3c82_0008979706.tmp" /SL5="$400FE,8538938,184320,c:\users\user\downloads\d54c1eb370064276e27d1a3f971f71156b4c3c82_0008979706"

Trending

Most Viewed

Loading...