Fun4us

By GoldSparrow in Adware

Threat Scorecard

Popularity Rank: 6,568
Threat Level: 80 % (High)
Infected Computers: 20,896
First Seen: April 24, 2015
Last Seen: March 8, 2026
OS(es) Affected: Windows

The Fun4us program has versions for Google Chrome and Mozilla Firefox that are used by adware developers to promote sponsored products and services and earn pay-per-click revenue. The modus operandi of Fun4us provides evidence for security experts to classify Fun4us as adware. The Fun4us adware acts similarly to SensePlus, Deal Finder and Winter Web that are known to prevent users from enjoying the Internet. The Fun4us adware is dispersed among computer users by using freeware setup files as vessels. You might want to use the 'Advanced' or 'Custom' option the next time you install a free application in order to avoid installing the Fun4us adware on your PC. Users infected with the Fun4us adware report a torrent of commercials in their web browser, and you may be provided with links to potentially harmful locations. Security experts note that the Fun4us adware might display pop-up windows, banners and ad boxes that may cover your browser surface. Moreover, the Fun4us adware may use tracking cookies and DOM storage data to generate tailor-suited ads. Web surfers that value their online privacy might wish to use a reputable anti-malware tool to remove the Fun4us adware from their machine.

Analysis Report

General information

Family Name: Trojan.Kryptik.BO
Signature status: No Signature

Known Samples

MD5: c515b28b0a907341b1177c3ab8506daf
SHA1: acd1438afcacb30b2ff7fee2fdcf18ce11980b09
File Size: 466.43 KB, 466432 bytes
MD5: 967a08d4b080993fc7b1eddafce89073
SHA1: be1b26580389beed900cd4b4d37d853fb43e8dd5
File Size: 1.57 MB, 1568768 bytes
MD5: a928ff6fc100606c996e06c2b39e266a
SHA1: ff6cfe9473d393e38c1c85968bbeda4d6727f247
SHA256: B662BBFF1C4A77B1D781AE534281999A617AE215D2F34CFD3CEB9EB05E7E595E
File Size: 3.52 MB, 3518464 bytes
MD5: e4baf227037298e45c7502a06dce17ae
SHA1: df573905f6943449b9b677297b2009bf20447139
SHA256: 1BA65CA8FCF62D084CC2F142B65F20F20098F4148C91F0194A0CB10C36128BC1
File Size: 1.10 MB, 1099264 bytes
MD5: b462bdf7bec1a9d82e06ba8f1cf749b8
SHA1: 33a920387535de0b025658db4fc803239b79efdf
SHA256: 4738AEB129235834B5B7E0983B9676F7DCC39FBCC904853F96AEF516BF554B48
File Size: 1.16 MB, 1156456 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File doesn't have security information
  • File has TLS information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
Show More
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Comments http://flylinkdc.blogspot.com/
Company Name FlylinkDC++ Team
File Description
  • FlylinkDC++
  • GangBang
  • WinImage application file
File Version
  • 8.50.8500
  • 6, 9, 386, 1928
Internal Name
  • FlylinkDC++
  • WINIMAGE
Legal Copyright
  • Copyright (C) 2022, Combat
  • Copyright © Gilles Vollant 1993-2009
  • Flylink DC++ Team
Original Filename
  • betting.exe
  • FlylinkDC.exe
  • WinImage.exe
Product Name
  • Bagspreads
  • FlylinkDC++
Product Version
  • 8.50.8500
  • 6.9.386.1928
Production Version 81.73.44.61
Products Version 9.68.10.78

Digital Signatures

Signer Root Status
Gilles Vollant GlobalSign Primary Object Publishing CA Hash Mismatch

File Traits

  • 2+ executable sections
  • HighEntropy
  • No Version Info
  • x86

Block Information

Total Blocks: 4,370
Potentially Malicious Blocks: 22
Whitelisted Blocks: 1,998
Unknown Blocks: 2,350

Visual Map

? ? ? ? ? 0 0 ? 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? 0 ? ? ? ? ? ? 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 ? ? 0 0 0 ? 0 0 0 0 0 0 0 ? ? ? 0 ? 0 ? ? 0 ? ? ? 0 0 ? 0 ? ? ? ? ? ? ? 0 ? ? ? ? ? ? ? 0 ? ? ? ? 0 ? 0 0 0 ? 0 0 0 0 0 ? ? ? ? ? ? ? ? 0 ? ? ? 0 ? ? ? ? 0 ? ? 0 ? ? 0 0 0 ? ? ? ? ? ? 0 0 0 ? ? ? ? 0 ? ? 0 ? ? ? ? ? ? 0 ? 0 ? ? ? ? ? ? ? ? ? 0 0 ? 0 ? ? ? ? 0 ? ? ? ? ? 0 ? ? ? ? ? ? ? ? ? ? ? 0 ? ? ? ? ? 0 0 0 ? ? 0 ? 0 0 ? ? 0 ? 0 0 ? ? ? 0 0 0 0 ? 0 0 ? 0 ? 0 0 0 0 0 ? ? ? ? ? ? ? ? ? x ? ? ? ? 0 ? ? ? ? 0 ? 0 ? ? ? ? x 0 ? ? 0 ? ? 0 ? ? 0 ? 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? 0 ? ? ? ? ? ? ? ? ? 0 ? ? ? 0 ? ? ? 0 ? ? ? ? 0 0 0 ? ? ? ? ? ? 0 ? 0 ? ? 0 0 ? ? ? ? ? ? ? 0 0 ? 0 0 0 0 ? ? ? ? ? 0 ? ? ? 0 ? 0 0 ? ? ? 0 0 ? 0 ? 0 ? ? ? ? ? ? ? 0 0 ? ? ? ? ? ? ? 0 ? ? 0 ? 0 0 ? 0 ? 0 ? ? ? ? 0 0 ? 0 0 0 ? ? ? ? 0 ? ? ? 0 ? 0 ? ? ? ? ? 0 ? ? 0 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? 0 ? 0 ? ? ? 0 0 ? ? ? ? 0 0 0 0 0 ? ? ? ? 0 ? ? 0 ? 0 ? 0 0 0 ? 0 ? 0 0 0 0 ? ? 0 ? ? 0 ? ? 0 ? 0 ? 0 0 0 ? ? ? 0 0 ? ? ? ? ? 0 ? ? ? ? ? ? 0 ? ? ? ? ? 0 ? ? ? ? 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? 0 0 0 0 ? ? ? ? 0 0 0 0 ? 0 0 0 ? ? ? ? ? ? ? ? ? 0 ? ? ? 0 0 ? ? ? 0 ? ? ? ? ? ? ? 0 ? ? ? 0 ? ? ? ? 0 ? ? ? ? ? ? ? ? ? ? 0 ? ? ? ? ? 0 0 ? ? ? ? ? ? ? 0 ? ? ? ? 0 ? ? ? ? 0 ? ? ? ? ? ? 0 ? 0 0 ? ? ? ? ? ? ? ? ? ? 0 ? ? ? ? 0 ? ? ? 0 ? 0 ? ? 0 ? ? ? 0 ? ? ? ? ? 0 ? 0 ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? 0 ? ? ? 0 ? 0 ? ? ? ? ? 0 0 ? ? 0 ? ? ? 0 0 0 0 0 ? ? ? ? ? ? 0 0 ? ? 0 ? ? ? ? 0 ? 0 ? ? ? ? 0 0 ? ? ? ? 0 ? 0 ? ? ? 0 ? ? ? ? ? ? ? 0 ? 0 ? ? ? ? 0 ? ? ? ? 0 ? ? ? ? ? ? 0 ? ? ? ? ? ? ? ? ? 0 0 ? ? ? ? ? ? ? ? ? ? 0 ? ? ? ? ? ? ? 0 0 ? ? 0 ? ? 0 ? ? 0 ? ? ? ? ? ? ? x 0 0 ? ? ? 0 ? 0 ? ? ? ? ? ? ? ? 0 ? ? 0 0 ? ? 0 ? 0 ? ? ? ? 0 ? ? 0 ? 0 ? ? ? ? ? 0 ? ? ? ? ? ? ? ? ? 0 ? ? 0 0 ? ? 0 0 ? ? 0 ? 0 ? ? 0 0 ? ? 0 ? ? ? ? ? ? ? ? ? ? ? 0 ? ? ? ? ? ? 0 ? ? ? 0 ? ? ? 0 ? ? ? ? ? ? 0 0 0 ? 0 ? ? 0 ? 0 0 ? ? ? ? ? 0 0 ? ? 0 ? 0 ? ? ? ? 0 0 0 0 ? ? ? ? ? 0 ? 0 0 0 ? 0 ? 0 ? ? ? 0 ? 0 ? ? 0 0 0 0 ? ? ? 0 ? ? 0 ? ? 0 0 0 ? 0 ? ? 0 ? ? ? 0 0 0 0 ? 0 0 ? ? ? 0 0 0 0 ? x ? 0 ? ? ? 0 0 ? ? 0 ? 0 0 ? ? ? ? ? ? ? ? ? ? ? ? 0 ? ? ? 0 ? 0 ? 0 ? ? ? ? ? ? 0 ? 0 0 ? 0 ? 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 1 1 0 0 1 0 1 0 0 0 2 0 2 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 1 0 0 1 1 2 0 0 1 0 0 0 2 0 1 0 0 0 0 1 0 0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 2 3 0 0 0 0 0 0 1 0 0 0 1 0 0 0 0 0 1 1 0 2 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 1 1 0 0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 2 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 1 1 0 0 1 0 0 0 0 0 0 0 0 0 1 1 3 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 x 0 0 ? ? ? ? ? 0 0 ? ? 0 ? 0 0 0 ? 0 0 ? 0 0 0 ? 0 ? ? 0 ? 0 ? ? ? ? 0 ? 0 0 ? ? 0 ? ? ? 0 ? 0 ? ? 0 ? 0 ? 0 ? 0 0 ? 0 ? 0 0 ? ? 0 ? 0 ? 0 ? ? ? ? ? 0 0 0 ? ? ? 0 0 ? 0 ? 0 ? ? 0 ? ? ? ? ? ? ? ? ? 0 ? ? ? ? ? ? 0 0 0 0 0 0 ? ? ? 0 ? 0 ? ? 0 ? 0 0 0 0 0 0 ? 0 0 0 ? 0 0 ? ? ? ? ? 0 0 0 ? ? 0 0 ? 0 ? 0 0 0 ? 0 0 ? ? 0 ? ? ? 0 0 0 ? 0 ? 0 ? 0 0 ? ? ? ? ? ? 0 0 ? ? 0 ? 0 ? ? ? 0 ? ? 0 ? 0 0 0 0 ? 0 ? ? ? 0 ? 0 ? 0 ? 0 0 ? ? ? ? ? 0 0 ? ? ? 0 0 ? ? 0 ? 0 0 0 ? ? ? x ? 0 0 ? 0 ? ? ? ? ? ? 0 0 0 0 0 ? 0 ? ? 0 0 0 ? ? 0 ? ? 0 0 0 ? ? 0 ? ? ? ? ? ? ? ? ? ? 0 ? ? ? ? ? ? ? ? ? ? ? 0 0 0 0 ? 0 ? 0 ? 0 ? ? ? ? ? ? 0 0 ? ? ? 0 0 0 ? 0 0 0 ?
... Data truncated
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Files Modified

File Attributes
c:\users\user\appdata\local\temp\$witemp$.htm Generic Write,Read Attributes
c:\users\user\downloads\settings\flylinkdc.sqlite Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\downloads\settings\flylinkdc_log.sqlite Generic Read,Write Data,Write Attributes,Write extended,Append data

Registry Modifications

Key::Value Data API Name
HKLM\software\classes\dchub:: URL:Direct Connect Protocol RegNtPreCreateKey
HKLM\software\classes\dchub::url protocol RegNtPreCreateKey
HKLM\software\classes\dchub\shell\open\command:: "c:\users\user\downloads\ff6cfe9473d393e38c1c85968bbeda4d6727f247_0003518464" /magnet %1 RegNtPreCreateKey
HKLM\software\classes\dchub\defaulticon:: c:\users\user\downloads\ff6cfe9473d393e38c1c85968bbeda4d6727f247_0003518464 RegNtPreCreateKey
HKLM\software\classes\adc:: URL:Direct Connect Protocol RegNtPreCreateKey
HKLM\software\classes\adc::url protocol RegNtPreCreateKey
HKLM\software\classes\adc\shell\open\command:: "c:\users\user\downloads\ff6cfe9473d393e38c1c85968bbeda4d6727f247_0003518464" /magnet %1 RegNtPreCreateKey
HKLM\software\classes\adc\defaulticon:: c:\users\user\downloads\ff6cfe9473d393e38c1c85968bbeda4d6727f247_0003518464 RegNtPreCreateKey
HKLM\software\classes\magnet:: URL:MAGNET URI RegNtPreCreateKey
HKLM\software\classes\magnet::url protocol (NULL) RegNtPreCreateKey
Show More
HKLM\software\classes\magnet\defaulticon:: "c:\users\user\downloads\ff6cfe9473d393e38c1c85968bbeda4d6727f247_0003518464" /magnet RegNtPreCreateKey
HKLM\software\classes\magnet\shell\open\command:: "c:\users\user\downloads\ff6cfe9473d393e38c1c85968bbeda4d6727f247_0003518464" /magnet %1 RegNtPreCreateKey
HKLM\software\wow6432node\magnet\handlers\dc++:: FlylinkDC++ RegNtPreCreateKey
HKLM\software\wow6432node\magnet\handlers\dc++::description Download files from the Direct Connect network RegNtPreCreateKey
HKLM\software\wow6432node\magnet\handlers\dc++::shellexecute "c:\users\user\downloads\ff6cfe9473d393e38c1c85968bbeda4d6727f247_0003518464" /magnet %URL RegNtPreCreateKey
HKLM\software\wow6432node\magnet\handlers\dc++::defaulticon "c:\users\user\downloads\ff6cfe9473d393e38c1c85968bbeda4d6727f247_0003518464" RegNtPreCreateKey
HKLM\software\wow6432node\magnet\handlers\dc++\type::urn:bitprint RegNtPreCreateKey
HKLM\software\wow6432node\magnet\handlers\dc++\type::urn:tigertree RegNtPreCreateKey
HKLM\software\wow6432node\magnet\handlers\dc++\type::urn:tree:tiger RegNtPreCreateKey
HKLM\software\wow6432node\magnet\handlers\dc++\type::urn:tree:tiger/ RegNtPreCreateKey
HKLM\software\wow6432node\magnet\handlers\dc++\type::urn:tree:tiger/1024 RegNtPreCreateKey
HKLM\software\wow6432node\magnet\handlers\dc++\type::bitprint RegNtPreCreateKey
HKLM\software\wow6432node\magnet\handlers\dc++\type::tigertree RegNtPreCreateKey
HKLM\software\wow6432node\magnet\handlers\dc++\type::tree:tiger RegNtPreCreateKey
HKLM\software\wow6432node\magnet\handlers\dc++\type::tree:tiger/ RegNtPreCreateKey
HKLM\software\wow6432node\magnet\handlers\dc++\type::tree:tiger/1024 RegNtPreCreateKey

Windows API Usage

Category API
Network Winsock2
  • WSAStartup
Anti Debug
  • IsDebuggerPresent
User Data Access
  • GetUserObjectInformation
Network Winsock
  • bind
  • closesocket
  • connect
  • getsockname
  • inet_addr
  • recvfrom
  • setsockopt
  • socket
Keyboard Access
  • GetKeyState

Trending

Most Viewed

Loading...