PriceFountain
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Popularity Rank: | 3,608 |
| Threat Level: | 20 % (Normal) |
| Infected Computers: | 61,828 |
| First Seen: | September 11, 2014 |
| Last Seen: | February 6, 2026 |
| OS(es) Affected: | Windows |
PriceFountain is an adware program that may attempt to assist computer users with saving money on the internet through shopping sites. The PriceFountain ads may be intrusive and bothersome to many computer users where they are displayed as pop-ups or banners that load while surfing the internet. The PriceFountain ads may also reduce performance of some web browsers making it hard to view certain pages or sites that have a lot of media resources to load. The PriceFountain ads are mostly unwanted and may be stopped through removal of the PriceFountain program and any related plugins or add-on components.
Table of Contents
SpyHunter Detects & Remove PriceFountain
File System Details
| # | File Name | MD5 |
Detections
Detections: The number of confirmed and suspected cases of a particular threat detected on
infected computers as reported by SpyHunter.
|
|---|---|---|---|
| 1. | PriceFountainIE.dll.vir | 7593be8c6ebf14ceead30f14004daf0c | 3,439 |
| 2. | treasonshayersupdater.exe.196737.gzquar | f51b38b72aad104861c2761b31fa6d57 | 118 |
| 3. | UpdateTask.exe | 10bacfd2851c0f591006f1938dc7f9fd | 97 |
| 4. | pricefountainupdateverupdate.exe | 701af2a68cd925ab2e5f4fe8d5e00dad | 64 |
| 5. | A15D2028-577E-4962-2370-BE1A747E3FBD_1d20f0cfe92c76e | 949f60bbf7c3435f3e3bb2219c44bc2b | 52 |
| 6. | PriceFountainUpdateVer.exe | 196e9ec186c99ef89b58c3d2f1793302 | 32 |
| 7. | pricefountainw.exe.vir | 7562a40072dffc3365b45f5ddbbd8fd4 | 23 |
| 8. | bkup.dat | c8be2d8f2af522c5e2f6865378a947b8 | 14 |
| 9. | pricefountain.exe | bf9223344cf805a417f13e6fb8011774 | 7 |
| 10. | prfo.dll | d2671ea6a02a33bd0fbf5e5f9ae248f8 | 5 |
| 11. | pricefountain.exe.vir | b4faedd0b50a04fc4c9c8e3299f83f53 | 3 |
| 12. | pricefountainw.exe | a5eb422fd7cd518492566fcc7271ecac | 1 |
| 13. | PriceFountainIE.dll | fc0d6bf2f31137e0ba953a5c79928af0 | 1 |
Registry Details
Directories
PriceFountain may create the following directory or directories:
| %APPDATA%\Microsoft\Windows\Start Menu\Programs\PriceFountain |
| %APPDATA%\PriceFountain |
| %APPDATA%\PriceFountainUpdateVer |
| %LOCALAPPDATA%\BawdierNeuter |
| %LOCALAPPDATA%\DieresisPeach |
| %LOCALAPPDATA%\KrishnaRheums |
| %LOCALAPPDATA%\PriceFountain |
| %LOCALAPPDATA%\TorchierIncidental |
| %PROGRAMFILES%\PriceFountain |
| %PROGRAMFILES(x86)%\PriceFountain |
| %Temp%\PriceFountain |
| %UserProfile%\Local Settings\Application Data\PriceFountain |
URLs
PriceFountain may call the following URLs:
| PriceFountain |
| pricefountain.com |
Analysis Report
General information
| Family Name: | Adware.PriceFountain |
|---|---|
| Signature status: | No Signature |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
2a551e16f09be86bf04187cd350e555b
SHA1:
54711c190cacf9617a14bc1ef94f28326b494945
File Size:
89.93 KB, 89927 bytes
|
|
MD5:
6568836f85e47e9662d1abf6bc1b225e
SHA1:
634bf4eb983ba179bb1ea97b5f3a247a944e4129
File Size:
47.54 KB, 47540 bytes
|
|
MD5:
8b38be25022c5620741d24d02be89d97
SHA1:
26781e6a65af20b8960271089b884480b45b7e26
File Size:
89.88 KB, 89881 bytes
|
|
MD5:
0ee8d7fb52e2eb34794f48271dc84c39
SHA1:
19231e7903e3a2c7a4b4094dea827fb050f6f2bc
SHA256:
9ED59AD319C3B3EC6B89E7AFD91C6DF4DB059B5C97293859E6758AE75217B78F
File Size:
370.69 KB, 370688 bytes
|
|
MD5:
4aae5161cedbd18f8364c752a4baaaae
SHA1:
3c473b4cac0d317f8b05ab9a1528e6e227a43756
SHA256:
5E7EDA8557F89A3C32D257D2A7995BA058A632C2399ACFA46F0166454C2581F0
File Size:
356.86 KB, 356864 bytes
|
Show More
|
MD5:
2c1c750a1835668d36621404f34340aa
SHA1:
86fead9bc7919c0ba5a50192dfde697118e31913
SHA256:
162869984B1262829F424D393EE7CF3B82C4862A4EEB35FD6A6BE47DCEBFA5B8
File Size:
47.53 KB, 47535 bytes
|
|
MD5:
23b8455ecc0b8e574f2e612efa4ab6a3
SHA1:
ad405d9e3e45e972a05747b769824819086a3563
SHA256:
CF43EE37F4285443DF22D0F30E11204CF0E940D3345691B9A886F7288BB3B7C3
File Size:
370.69 KB, 370688 bytes
|
|
MD5:
66334d259b9c433b10b8945b338da3fc
SHA1:
895bbed73f592576dd0664190838cd25345519ce
SHA256:
96E51776EC17F2678EC7DF99BDAE17EAFD17D5BF1AEF28682BDD374CD58DA4A5
File Size:
89.92 KB, 89923 bytes
|
|
MD5:
15fe57324833af3eddf8102088d9256f
SHA1:
d08498372abc285232bdde82fdce44031bfc6807
SHA256:
B3C8821D185445B9DCEF5F8DF73F759F0E194FE164320DE73210584A2CC493B5
File Size:
47.54 KB, 47536 bytes
|
|
MD5:
5b88f67c451850da971eadb05bfcbb84
SHA1:
8079a4dfb92ff503fff184e2b1fca30cfc4dfc67
SHA256:
851E97A8E74851D6824DCAD43560607CFB3503119C4AF557A40054049E1562FE
File Size:
47.53 KB, 47533 bytes
|
|
MD5:
533b2f43ee2e168c566a0cbe90ca01b0
SHA1:
de03ff4e377717588a9f25753084394c82e02ad1
SHA256:
E63E5D55C2DECFF62515AD3BB659BB74A6EDAC6F57BC1BF64AC24C868B833BB4
File Size:
47.54 KB, 47537 bytes
|
|
MD5:
1d0c630e4a94a925d77d23147031cac4
SHA1:
0e2e3d61ac268b6b7594e0a7c1cedcd2a98c9ce6
SHA256:
15A64D45AFB7A57361EBB142AC272CCB2E1F3C5C1159670BA9833AEDEA7F3A94
File Size:
427.52 KB, 427520 bytes
|
|
MD5:
9331a861b1912de89a9119d4761831f3
SHA1:
6a472e9af2921231427acf86c28d6f9fc19ae8df
SHA256:
6874A832468FA624638E4B8F33B7EF9DBA471F6FCA0F45C7929285B31358A491
File Size:
370.69 KB, 370688 bytes
|
|
MD5:
ab0d9c05142e3165e1a5370a519dd5a5
SHA1:
a092a0d5c9e1a9438b017904917650093981d17d
SHA256:
236C47F11FB648FF8A520E400C2C8073ABCF9BC39E6BC7C6B604C672CD864590
File Size:
89.92 KB, 89924 bytes
|
|
MD5:
e6ec41404b352b33b34ac4e162177d57
SHA1:
00eb1908999a02b0b4289e3ad8b4834b60460f9a
SHA256:
106B61AC68042FC7A0BD49473B2E844797A6FB6E4D4E4360A9CE621E1B73F1B8
File Size:
371.20 KB, 371200 bytes
|
|
MD5:
3666ccfaf962e3325daf828978d3ec62
SHA1:
f88de0faf88c7e17ad1786f158d6b1448c067aba
SHA256:
428A0AF35B98193454FAE61357F8A552CA5391EDE683216FC5C04A873488F3BA
File Size:
371.20 KB, 371200 bytes
|
|
MD5:
8928da0541d623798513faf45eaab9f6
SHA1:
b5c1ee4b415c1c467a09d463583408c386556bf0
SHA256:
DC7600E3355E4CE6C1166ED999DA2EFE353AA19DCAE77059A9CA98BE0C88FD9D
File Size:
89.87 KB, 89872 bytes
|
|
MD5:
369cf1a1bfb07183d15453f83b3f33fb
SHA1:
15bc636a97238715b55ac48d3a8ff0184defcab1
SHA256:
7A631506782266D24D1CC5E6B84FF4EB38DBEFBA29EBEBF58878D9A453BC1A15
File Size:
356.86 KB, 356864 bytes
|
|
MD5:
e04eef7aa9d5b9a517fd57f97afa464f
SHA1:
486802702b49b9bd99786e27dc8e585427314a29
SHA256:
6180B1328DFB09D0D54D4EA3B5895BF1A69CD024EB6812FABDAEA737772B1549
File Size:
89.93 KB, 89930 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have relocations information
- File doesn't have security information
- File has exports table
- File is 32-bit executable
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
- File is Native application (NOT .NET application)
Show More
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| F I L E Version |
|
| I N T E R N A L Name |
|
| L E G A L Copyright |
|
| O R I G I N A L Filename |
|
| P R O D U C T Version |
|
File Traits
- dll
- HighEntropy
- x86
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| \device\namedpipe | Generic Read,Write Attributes |
| \device\namedpipe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsba525.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsba525.tmp\nsexec.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsba525.tmp\nsexec.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsba525.tmp\nsprocess.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsba525.tmp\nsprocess.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsba525.tmp\stdutils.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsba525.tmp\stdutils.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsba525.tmp\system.dll | Generic Write,Read Attributes |
Show More
| c:\users\user\appdata\local\temp\nsba525.tmp\system.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsg69a8.tmp\nsexec.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsg69a8.tmp\system.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsk5b88.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsk5b88.tmp\nsexec.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsk5b88.tmp\nsexec.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsk5b88.tmp\nsprocess.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsk5b88.tmp\nsprocess.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsk5b88.tmp\system.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsk5b88.tmp\system.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsn5bef.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsn5bef.tmp\nsexec.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsn5bef.tmp\nsexec.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsn5bef.tmp\nsprocess.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsn5bef.tmp\nsprocess.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsn5bef.tmp\stdutils.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsn5bef.tmp\stdutils.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsn5bef.tmp\system.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsn5bef.tmp\system.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsna8bf.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsna8bf.tmp\nsexec.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsna8bf.tmp\nsexec.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsna8bf.tmp\nsprocess.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsna8bf.tmp\nsprocess.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsna8bf.tmp\stdutils.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsna8bf.tmp\stdutils.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsna8bf.tmp\system.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsna8bf.tmp\system.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nso5594.tmp\nsexec.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nso5594.tmp\system.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsp64c6.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsp64c6.tmp\nsexec.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsp64c6.tmp\nsexec.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsp64c6.tmp\nsprocess.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsp64c6.tmp\nsprocess.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsp64c6.tmp\system.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsp64c6.tmp\system.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsw1464.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsw1464.tmp\nsexec.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsw1464.tmp\nsexec.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsw1464.tmp\nsprocess.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsw1464.tmp\nsprocess.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsw1464.tmp\stdutils.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsw1464.tmp\stdutils.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsw1464.tmp\system.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsw1464.tmp\system.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsx5229.tmp\nsexec.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsx5229.tmp\system.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsx6f2f.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsx6f2f.tmp\nsexec.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsx6f2f.tmp\nsexec.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsx6f2f.tmp\nsprocess.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsx6f2f.tmp\nsprocess.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsx6f2f.tmp\system.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsx6f2f.tmp\system.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsz69c5.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsz69c5.tmp\nsexec.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsz69c5.tmp\nsexec.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsz69c5.tmp\nsprocess.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsz69c5.tmp\nsprocess.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsz69c5.tmp\system.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsz69c5.tmp\system.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\~nsu.tmp\au_.exe | Generic Read,Write Data,Write Attributes,Write extended,Append data,Delete,LEFT 262144 |
| c:\users\user\downloads | Synchronize,Write Attributes |
| c:\users\user\downloads\486802702b49b9bd99786e27dc8e585427314a29_0000089930 | Synchronize,Write Attributes |
| c:\users\user\downloads\634bf4eb983ba179bb1ea97b5f3a247a944e4129_0000047540.exe | Synchronize,Write Attributes |
| c:\users\user\downloads\8079a4dfb92ff503fff184e2b1fca30cfc4dfc67_0000047533 | Synchronize,Write Attributes |
| c:\users\user\downloads\895bbed73f592576dd0664190838cd25345519ce_0000089923 | Synchronize,Write Attributes |
| c:\users\user\downloads\a092a0d5c9e1a9438b017904917650093981d17d_0000089924 | Synchronize,Write Attributes |
| c:\users\user\downloads\b5c1ee4b415c1c467a09d463583408c386556bf0_0000089872 | Synchronize,Write Attributes |
| c:\users\user\downloads\d08498372abc285232bdde82fdce44031bfc6807_0000047536 | Synchronize,Write Attributes |
| c:\users\user\downloads\de03ff4e377717588a9f25753084394c82e02ad1_0000047537 | Synchronize,Write Attributes |
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | Data | API Name |
|---|---|---|
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Users\Ggtxkaay\AppData\Local\Temp\~nsu.tmp\Au_.exe | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Users\Ggtxkaay\AppData\Local\Temp\~nsu.tmp\Au_.exe \??\C:\Users\Ggtxkaay\AppData\Local\Temp\~nsu.tmp | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | ᧰Ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Users\Hkbbuwno\AppData\Local\Temp\~nsu.tmp\Au_.exe | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Users\Hkbbuwno\AppData\Local\Temp\~nsu.tmp\Au_.exe \??\C:\Users\Hkbbuwno\AppData\Local\Temp\~nsu.tmp | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | ᰳ啐Ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Users\Hkbbuwno\AppData\Local\Temp\nsp64C6.tmp\nsprocess.dll | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Users\Hkbbuwno\AppData\Local\Temp\nsp64C6.tmp\nsprocess.dll \??\C:\Users\Hkbbuwno\AppData\Local\Temp\nsp64C6.tmp\ | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Users\Pigsmvnt\AppData\Local\Temp\~nsu.tmp\Au_.exe | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Users\Pigsmvnt\AppData\Local\Temp\~nsu.tmp\Au_.exe \??\C:\Users\Pigsmvnt\AppData\Local\Temp\~nsu.tmp | RegNtPreCreateKey |
Show More
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Users\Ulxblgfl\AppData\Local\Temp\~nsu.tmp\Au_.exe | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Users\Ulxblgfl\AppData\Local\Temp\~nsu.tmp\Au_.exe \??\C:\Users\Ulxblgfl\AppData\Local\Temp\~nsu.tmp | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Users\Eznhyqqy\AppData\Local\Temp\~nsu.tmp\Au_.exe | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Users\Eznhyqqy\AppData\Local\Temp\~nsu.tmp\Au_.exe \??\C:\Users\Eznhyqqy\AppData\Local\Temp\~nsu.tmp | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | RegNtPreCreateKey | |
| HKCU::uninstalled | TRUE | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Users\Eznhyqqy\AppData\Local\Temp\nsw1464.tmp\nsprocess.dll | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Users\Eznhyqqy\AppData\Local\Temp\nsw1464.tmp\nsprocess.dll \??\C:\Users\Eznhyqqy\AppData\Local\Temp\nsw1464.tmp\ | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Users\Ftbgsaet\AppData\Local\Temp\~nsu.tmp\Au_.exe | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Users\Ftbgsaet\AppData\Local\Temp\~nsu.tmp\Au_.exe \??\C:\Users\Ftbgsaet\AppData\Local\Temp\~nsu.tmp | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 秓䆈䗧ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Users\Ftbgsaet\AppData\Local\Temp\nsk5B88.tmp\nsprocess.dll | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Users\Ftbgsaet\AppData\Local\Temp\nsk5B88.tmp\nsprocess.dll \??\C:\Users\Ftbgsaet\AppData\Local\Temp\nsk5B88.tmp\ | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.205.9 \??\C:\Windows\SystemTemp\16c022bd-5ef5-475f-a01d-152d7f6dbd19.tmp \ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 돔펊唺ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.205.9 \??\C:\Users\Cxycpcvj\AppData\Local\Temp\~nsu.tmp\Au_.exe | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.205.9 \??\C:\Users\Cxycpcvj\AppData\Local\Temp\~nsu.tmp\Au_.exe \??\C:\Use | RegNtPreCreateKey |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\software\microsoft\windows nt\currentversion\notifications\data::418a073aa3bc1c75 | RegNtPreCreateKey | |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 䃒槅坬ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.205.9 \??\C:\Users\Cxycpcvj\AppData\Local\Temp\nsx6F2F.tmp\nsprocess.dll | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Program Files (x86)\Microsoft\EdgeUpdate\1.3.205.9 \??\C:\Users\Cxycpcvj\AppData\Local\Temp\nsx6F2F.tmp\nsprocess.dll \ | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Windows\SystemTemp\77e37ce0-8214-4414-aced-551c5ae204d7.tmp \??\C:\Windows\SystemTemp\e28eadcf-6ab0-4d8c-8821-7ce9a6aba1 | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | ꮧ幢毸ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | *1\??\C:\Windows\SystemTemp\MicrosoftEdgeUpdate.exe.old122e4 *1\??\C:\Windows\SystemTemp\CopilotUpdate.exe.old12352 *1\??\C:\P | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 嵥觭ǜ | RegNtPreCreateKey |
| HKLM\system\controlset001\services\bam\state\usersettings\s-1-5-21-3119368278-1123331430-659265220-1001::\device\harddiskvolume2\windows\system32\conhost.exe | 娼룻錒ǜ | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| Process Shell Execute |
|
| Syscall Use |
Show More
66 additional items are not displayed above. |
| Anti Debug |
|
| User Data Access |
|
| Process Terminate |
|
| Process Manipulation Evasion |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
"C:\Users\Ggtxkaay\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=c:\users\user\downloads\
|
"C:\WINDOWS\system32\CScript.exe" //b //e:vbscript //nologo "c:\users\user\downloads\SoldierGlasswork.dat" "http://ins.pricejs.net/dealdo/install-report?type=install&step=uninstall&instgrp=&partner=&channel=&reason=&hid=&winver=8.1&ver=&tm=0507183250&cmdline=%22C:\Users\Ggtxkaay\AppData\Local\Temp\~nsu.tmp\Au_.exe%22%20"
|
"C:\Users\Hkbbuwno\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=c:\users\user\downloads\
|
"C:\WINDOWS\system32\CScript.exe" //b //e:vbscript //nologo "c:\users\user\downloads\BaronetciesPlasmapheresis.dat" http://ins.pricejs.net/dealdo/install-report?type=install&step=uninstall&instgrp=&partner=&channel=&reason=&hid=&winver=8.1&ver=
|
"C:\Users\Pigsmvnt\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=c:\users\user\downloads\
|
Show More
"C:\WINDOWS\system32\CScript.exe" //b //e:vbscript //nologo "c:\users\user\downloads\ConveningPushcart.dat" "http://ins.pricejs.net/dealdo/install-report?type=install&step=uninstall&instgrp=&partner=&channel=&reason=&hid=&winver=8.1&ver=&tm=150712851&cmdline=%22C:\Users\Pigsmvnt\AppData\Local\Temp\~nsu.tmp\Au_.exe%22%20"
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\19231e7903e3a2c7a4b4094dea827fb050f6f2bc_0000370688.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\3c473b4cac0d317f8b05ab9a1528e6e227a43756_0000356864.,LiQMAxHB
|
"C:\Users\Ulxblgfl\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=c:\users\user\downloads\
|
"C:\WINDOWS\system32\CScript.exe" //b //e:vbscript //nologo "c:\users\user\downloads\TakersMonocot.dat" http://ins.pricejs.net/dealdo/install-report?type=install&step=uninstall&instgrp=&partner=&channel=&reason=&hid=&winver=8.1&ver=
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\ad405d9e3e45e972a05747b769824819086a3563_0000370688.,LiQMAxHB
|
"C:\Users\Eznhyqqy\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=c:\users\user\downloads\
|
"C:\WINDOWS\system32\CScript.exe" //b //e:vbscript //nologo "c:\users\user\downloads\SerenelyCoziness.dat" "http://ins.pricejs.net/dealdo/install-report?type=install&step=uninstall&instgrp=&partner=&channel=&reason=&hid=&winver=8.1&ver=&tm=241001231&cmdline=%22C:\Users\Eznhyqqy\AppData\Local\Temp\~nsu.tmp\Au_.exe%22%20"
|
"C:\Users\Ftbgsaet\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=c:\users\user\downloads\
|
"C:\WINDOWS\system32\CScript.exe" //b //e:vbscript //nologo "c:\users\user\downloads\TapewormsFactor.dat" http://ins.pricejs.net/dealdo/install-report?type=install&step=uninstall&instgrp=&partner=&channel=&reason=&hid=&winver=8.1&ver=
|
"C:\Users\Whsjtwuq\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=c:\users\user\downloads\
|
"C:\WINDOWS\system32\CScript.exe" //b //e:vbscript //nologo "c:\users\user\downloads\ReforestedCrepey.dat" http://ins.pricejs.net/dealdo/install-report?type=install&step=uninstall&instgrp=&partner=&channel=&reason=&hid=&winver=8.1&ver=
|
"C:\Users\Cxycpcvj\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=c:\users\user\downloads\
|
"C:\WINDOWS\system32\CScript.exe" //b //e:vbscript //nologo "c:\users\user\downloads\KludgingCredibleness.dat" http://ins.pricejs.net/dealdo/install-report?type=install&step=uninstall&instgrp=&partner=&channel=&reason=&hid=&winver=8.1&ver=
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\0e2e3d61ac268b6b7594e0a7c1cedcd2a98c9ce6_0000427520.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\6a472e9af2921231427acf86c28d6f9fc19ae8df_0000370688.,LiQMAxHB
|
"C:\Users\Hzdioufo\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=c:\users\user\downloads\
|
"C:\WINDOWS\system32\CScript.exe" //b //e:vbscript //nologo "c:\users\user\downloads\PelletsSnowmen.dat" "http://ins.pricejs.net/dealdo/install-report?type=install&step=uninstall&instgrp=&partner=&channel=&reason=&hid=&winver=8.1&ver=&tm=1212221859&cmdline=%22C:\Users\Hzdioufo\AppData\Local\Temp\~nsu.tmp\Au_.exe%22%20"
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\00eb1908999a02b0b4289e3ad8b4834b60460f9a_0000371200.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\f88de0faf88c7e17ad1786f158d6b1448c067aba_0000371200.,LiQMAxHB
|
"C:\Users\Gundtsym\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=c:\users\user\downloads\
|
"C:\WINDOWS\system32\CScript.exe" //b //e:vbscript //nologo "c:\users\user\downloads\CudBards.dat" "http://ins.pricejs.net/dealdo/install-report?type=install&step=uninstall&instgrp=&partner=&channel=&reason=&hid=&winver=8.1&ver=&tm=200111548&cmdline=%22C:\Users\Gundtsym\AppData\Local\Temp\~nsu.tmp\Au_.exe%22%20"
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\15bc636a97238715b55ac48d3a8ff0184defcab1_0000356864.,LiQMAxHB
|
"C:\Users\Upbgrmmq\AppData\Local\Temp\~nsu.tmp\Au_.exe" _?=c:\users\user\downloads\
|
"C:\WINDOWS\system32\CScript.exe" //b //e:vbscript //nologo "c:\users\user\downloads\NonsubscriberIntimidations.dat" "http://ins.pricejs.net/dealdo/install-report?type=install&step=uninstall&instgrp=&partner=&channel=&reason=&hid=&winver=8.1&ver=&tm=3101163553&cmdline=%22C:\Users\Upbgrmmq\AppData\Local\Temp\~nsu.tmp\Au_.exe%22%20"
|