Threat Database Adware Gen:Variant.Adware.Kazy.432610

Gen:Variant.Adware.Kazy.432610

By CagedTech in Adware

Threat Scorecard

Popularity Rank: 17,040
Threat Level: 20 % (Normal)
Infected Computers: 360
First Seen: December 17, 2014
Last Seen: August 14, 2025
OS(es) Affected: Windows

The Gen:Variant.Adware.Kazy.432610 detection is used to notify computer users of the adware functionality of the Bundle Offer Manager by Bundle, Inc. Security researchers have determined that the software can display advertisement materials in the web browser. Users that have the Bundle Offer Manager on their PC may experience pop-ups, banners, and transitional ads. Adware may collect certain non-personally identifiable information such as your IP address, and MAC address and ads may prove intrusive. You may want to remove the Bundle Offer Manager with a trusted anti-malware utility.

Analysis Report

General information

Family Name: Adware.Multiplug.GA
Signature status: Root Not Trusted

Known Samples

MD5: 09330f4cc67a638e7d4cf46ec46ff428
SHA1: 9f59ff9a7ebff57ab950f36be57ab34f4e911bb1
SHA256: 6A6CD9B6AF21B657E9DBBDB61176DEC9621BF1AC45548A14357E3727682A0FA8
File Size: 1.76 MB, 1758256 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File has exports table
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

Digital Signatures

Signer Root Status
Super PC Tools Limited UTN-USERFirst-Object Root Not Trusted

File Traits

  • dll
  • HighEntropy
  • x86

Block Information

Total Blocks: 1,609
Potentially Malicious Blocks: 814
Whitelisted Blocks: 704
Unknown Blocks: 91

Visual Map

0 x 0 x 0 ? ? 0 x x 0 x ? 0 0 0 x x x 0 x x 0 x x x x 0 x 0 x x 0 ? x x x ? 0 x x x x x 0 0 0 0 x x 0 x 0 x x x x 0 0 0 0 x x x 0 0 x x x x 0 0 x x x 0 x 0 0 0 x x x x x x x x x x 0 0 0 x x 0 x ? x x x x 0 0 x x x x x x x 0 x 1 x x 0 x x x x 0 0 x x 0 0 0 x x x x x x x x 0 0 0 0 x x x x 0 0 x x x x x 0 ? x 0 0 x x x 0 0 0 1 1 0 0 0 0 1 1 0 0 0 0 0 0 0 1 0 0 0 0 1 1 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 2 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 2 3 0 0 0 0 0 0 1 0 0 1 0 1 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 2 2 1 0 0 1 0 0 2 1 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 1 0 0 0 x x 0 0 0 x 0 x 1 x x x x 0 x 0 0 x x x x x x 0 x x 0 x 0 x 0 0 x 0 0 x 0 x x x x x ? x x ? 0 x x x 0 x 0 0 x x 0 x x x 0 ? 0 0 x 0 x x x x 0 x 0 x x x x 0 ? x 0 x 0 x x x x x x x 0 x x x x x ? 0 0 0 0 0 0 x x 0 x 0 x 0 x 0 ? 0 0 x 0 0 x 0 x 0 x x x x x x x 0 x x x x x x x x x 0 x x x 0 0 x 0 0 x 0 0 0 0 x 0 x x x 0 x 0 x ? 0 x 0 0 x 0 x 0 x x x x x 0 0 x 0 x x 0 x x x x x x x x x x 0 x 0 x 0 x 0 x x x x ? 0 x x x 0 x x 0 0 x 0 0 x 0 x 0 x x x x x x 0 x 0 x x x x x x ? x 0 0 x x x x 0 0 x x 0 x x x x x x x x x 0 0 0 0 0 x ? ? x x x 0 x x x x x x x ? x x x x x x 0 0 x 0 0 x x 0 x ? x 0 0 ? x 0 x x 0 ? 0 x x 0 x 0 0 x x 0 x 0 0 0 0 x x x x 0 0 x 0 x x x 0 0 ? x x x 0 0 x x x 0 x 0 0 0 0 x x x 0 x 0 x x x x x x x 0 x x 0 0 0 x 0 x x x 0 0 x x x x x x 0 x 0 x 0 x x x 0 x x x x x x 0 x x x x x 0 0 x x x x x 0 x 0 x x x x x x x x x x 0 x x 0 0 x x x x 0 0 ? 0 x 0 ? x x 0 0 0 x 0 0 x x x 0 x ? x 0 0 0 x 0 0 x x x x 0 x 0 x x 0 x x x 0 ? x x x 0 0 0 0 0 x x 0 0 0 x x x x ? x x x x ? x x 0 x 0 x x x x 0 x x x x x 0 0 0 0 x x 0 0 x x x x 0 x x x x 0 x x ? 0 x x 0 x 0 x 0 x 0 0 x 0 x x x x x x x 0 x 0 0 x x 0 x x x x x ? 0 0 x x x x x x x x x x 0 0 0 0 0 x x x x x x 0 x x ? x 0 x x x x 0 x x x x 0 x 0 0 x x 0 x x x x 0 x x 0 x x 0 0 0 x x x ? x 0 0 0 0 0 0 x x x 0 x 0 0 x x x x x x 0 0 x x x x 0 x ? x 0 x x 0 0 x x x x x 0 x 0 x 0 0 0 0 x x 0 x x 0 0 0 x 0 0 0 x 0 x 0 x x x x x 0 x x 0 x x 0 0 x ? x 0 x x 0 x x 0 x x x 0 0 0 x x x x x 0 0 x x 0 x x x x x x 0 x x x x 0 x 0 x 0 x 0 0 0 x x 0 x x 0 x x x x x x 0 x x x 0 x 0 x x x x 0 0 x 0 x x x x x x x x x x 0 x 0 x x 0 x x 0 x x x x x x x x x x 0 0 ? 0 0 0 0 ? x ? ? x x x x 0 x x 0 x x x x x 0 x x x x x x x x x x x x 0 0 x x x 0 x 0 0 0 x x 0 ? 0 ? x x x x x x x x x x 0 x x x x x 0 0 x 0 0 x x x x 0 x x x x x 0 x x x x ? x x 0 x x x x 0 x x x x x x 0 x x x x 0 x x 0 x x x x x x 0 0 x 0 x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x x 0 x x x x 0 x x x x x x x x x 0 0 x x x x x x 0 ? x x x x x x x x 0 x x x ? 0 ? 0 0 x 0 0 x x x ? 0 x x x x x x 0 x 0 0 x x 0 x x x x 0 0 0 x x x 0 x 0 x 0 x x 0 0 0 0 0 0 x x 0 x x x 0 0 0 0 x x x x 0 0 x x x x x ? x x x x 0 x 0 0 0 x x x 0 x x 0 x 0 0 0 x x x x x x 0 x x 0 x 0 0 x ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ? ?
0 - Probable Safe Block
? - Unknown Block
x - Potentially Malicious Block

Similar Families

  • Multiplug.GA

Windows API Usage

Category API
Syscall Use
  • ntdll.dll!NtAlpcSendWaitReceivePort
  • ntdll.dll!NtClose
  • ntdll.dll!NtCreateFile
  • ntdll.dll!NtCreateSection
  • ntdll.dll!NtFreeVirtualMemory
  • ntdll.dll!NtMapViewOfSection
  • ntdll.dll!NtOpenFile
  • ntdll.dll!NtOpenKey
  • ntdll.dll!NtOpenProcessToken
  • ntdll.dll!NtProtectVirtualMemory
Show More
  • ntdll.dll!NtQueryAttributesFile
  • ntdll.dll!NtQueryDebugFilterState
  • ntdll.dll!NtQueryInformationProcess
  • ntdll.dll!NtQueryInformationThread
  • ntdll.dll!NtQueryInformationToken
  • ntdll.dll!NtQuerySystemInformationEx
  • ntdll.dll!NtQueryValueKey
  • ntdll.dll!NtQueryVirtualMemory
  • ntdll.dll!NtQueryVolumeInformationFile
  • ntdll.dll!NtReadFile
  • ntdll.dll!NtSetEvent
  • ntdll.dll!NtSetInformationFile
  • ntdll.dll!NtSetInformationProcess
  • ntdll.dll!NtTestAlert
  • ntdll.dll!NtUnmapViewOfSection
  • ntdll.dll!NtWaitForSingleObject
  • ntdll.dll!NtWriteFile
  • ntdll.dll!NtWriteVirtualMemory
  • win32u.dll!NtUserGetKeyboardLayout
  • win32u.dll!NtUserGetThreadState
Process Shell Execute
  • CreateProcess
Anti Debug
  • NtQuerySystemInformation

Shell Command Execution

C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\9f59ff9a7ebff57ab950f36be57ab34f4e911bb1_0001758256.,LiQMAxHB

Trending

Most Viewed

Loading...