Threat Database Potentially Unwanted Programs PUP.YAC (Yet Another Cleaner)

PUP.YAC (Yet Another Cleaner)

Threat Scorecard

Popularity Rank: 1,852
Threat Level: 10 % (Normal)
Infected Computers: 223,555
First Seen: December 27, 2013
Last Seen: February 4, 2026
OS(es) Affected: Windows

File System Details

PUP.YAC (Yet Another Cleaner) may create the following file(s):
# File Name MD5 Detections
1. aerdl.dll 0750556e1471fc9d823c30bc99b77a38 3,098
2. aedroid.dll b2987d8a627afce56302498d912161f7 1,471
3. aeheur.dll edf1ff20c2277e9af3778757c987d14c 1,163
4. aescript.dll 9a639617aeeb415832e659714053fcab 1,085
5. aeoffice.dll 223b886130b8e2e03a3702dc92efe5a4 1,069
6. aeexp.dll 16652e6d9b7d961e9f1ca93c94fcecb0 898
7. aemobile.dll f3b78103c2bbceaeb933727049bcc5d4 839
8. bas.dat 46721a65cc7400788bf58072f5ff70a6 823
9. adb.dat d08eb2854b761c9ec1e36d590790f776 769
10. rms.dat 649172d71d4aca8496fba5e53fe940bc 762
11. index.dat a4c186fe42f4e798b3e2741822091b33 739
12. mic.dat bf771c93b7f109934054742a262573e5 664
13. nlu.dat b6b096e15554281027b0ffe59e94a0b9 664
14. bs.dat 649a07a151c973d009eb055ed02af399 607
15. stu.dat 3c13507f1e9bf138714daa4e04d98cfd 591
16. uis.dat 0744e7ed95e05352e420f290614ddf3d 590
17. aescn.dll 7a09731d5c7c6c6c97cb01ced6544e2b 529
18. bwd.dat 21c4dd4e2c6f525aff8cb2f14deed567 223
19. A0585417.dll 4641639cbf2195019f386db9b9ba203e 56
20. A0330162.dll 109b39ad96c36a7d456f3584ac738b0e 53
21. A0330159.dll f657b8fbd27fb83cd3e594e5ec84d012 52
22. aegen.dll 266b1c726a11c338b3d30e5759ad9cb5 46
23. A0023360.dll d8e6dff3afe4138bd9b040af30f85918 26
24. A0326620.dll a602d49140782f96cf8acfb8b9be3bfa 14
25. A0326627.dll 8e45efe2779df04f0809ad93633e4fd6 14
26. iSafeNetFilter.sys 702d15a8ba2cc13b31865ce1ea11baf7 7
27. iSafeKrnlBoot.sys 67808f55a8590f2843aa9b9935089d29 5
28. eas.dat 7c0ce536cb12533f3d54cd23f56c1dad 3
29. yac_setup.exe 1a126b528993fd081e9a1cda4ca2a96a 1
30. aevdf.dat 3b8ce109a27ee673b8e265bcfdab5cf2 0
More files

Registry Details

PUP.YAC (Yet Another Cleaner) may create the following registry entry or registry entries:
CLSID
{0EB9B9FE-3CEF-43E1-882A-853FC80021CE}
{5411D116-5A37-47D4-B154-5F7FCD9062F0}
File name without path
YAC.lnk
Regexp file mask
%AppData%\Microsoft\Internet Explorer\Quick Launch\User Pinned\StartMenu\Depth clean up junk files.lnk
%WINDIR%\System32\drivers\iSafeKrnlBoot.sys
%WINDIR%\System32\drivers\iSafeNetFilter.sys
%WinDir%\System32\log\iSafeKrnlCall.log
*\shellex\ContextMenuHandlers\iSafeRKScan
CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shell\iSafeRKScan
CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex\ContextMenuHandlers\iSafeRKScan
Directory\shellex\ContextMenuHandlers\iSafeRKScan
Folder\ShellEx\ContextMenuHandlers\iSafeRKScan
lnkfile\shellex\ContextMenuHandlers\iSafeRKScan
SOFTWARE\Classes\*\shellex\ContextMenuHandlers\iSafeRKScan
SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shell\iSafeRKScan
SOFTWARE\Classes\CLSID\{645FF040-5081-101B-9F08-00AA002F954E}\shellex\ContextMenuHandlers\iSafeRKScan
SOFTWARE\Classes\Directory\shellex\ContextMenuHandlers\iSafeRKScan
SOFTWARE\Classes\Folder\ShellEx\ContextMenuHandlers\iSafeRKScan
SOFTWARE\Classes\lnkfile\shellex\ContextMenuHandlers\iSafeRKScan
SOFTWARE\Elex-tech
SOFTWARE\iSafe
SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{0EB9B9FE-3CEF-43E1-882A-853FC80021CE}
SOFTWARE\Microsoft\Windows\CurrentVersion\Shell Extensions\Approved\{5411D116-5A37-47D4-B154-5F7FCD9062F0}
SOFTWARE\Microsoft\Windows\CurrentVersion\Uninstall\iSafe
SOFTWARE\Wow6432Node\Elex-tech
SOFTWARE\Wow6432Node\iSafe
SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Uninstall\iSafe
SYSTEM\ControlSet001\Control\iSafeKrnlBoot
SYSTEM\ControlSet001\Enum\Root\LEGACY_ISAFEKRNL
SYSTEM\ControlSet001\Enum\Root\LEGACY_ISAFEKRNLKIT
SYSTEM\ControlSet001\Enum\Root\LEGACY_ISAFEKRNLR3
SYSTEM\ControlSet001\Enum\Root\LEGACY_ISAFENETFILTER
SYSTEM\ControlSet001\services\iSafeKrnl
SYSTEM\ControlSet001\services\iSafeKrnlBoot
SYSTEM\ControlSet001\services\iSafeKrnlKit
SYSTEM\ControlSet001\services\iSafeKrnlR3
SYSTEM\ControlSet001\services\iSafeNetFilter
SYSTEM\ControlSet001\services\iSafeService
SYSTEM\ControlSet002\Control\iSafeKrnlBoot
SYSTEM\ControlSet002\Enum\Root\LEGACY_ISAFEKRNL
SYSTEM\ControlSet002\Enum\Root\LEGACY_ISAFEKRNLKIT
SYSTEM\ControlSet002\Enum\Root\LEGACY_ISAFEKRNLR3
SYSTEM\ControlSet002\Enum\Root\LEGACY_ISAFENETFILTER
SYSTEM\ControlSet002\services\iSafeKrnl
SYSTEM\ControlSet002\services\iSafeKrnlBoot
SYSTEM\ControlSet002\services\iSafeKrnlKit
SYSTEM\ControlSet002\services\iSafeKrnlR3
SYSTEM\ControlSet002\services\iSafeNetFilter
SYSTEM\ControlSet002\services\iSafeService
SYSTEM\CurrentControlSet\Control\iSafeKrnlBoot
SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ISAFEKRNL
SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ISAFEKRNLKIT
SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ISAFEKRNLR3
SYSTEM\CurrentControlSet\Enum\Root\LEGACY_ISAFENETFILTER
SYSTEM\CurrentControlSet\services\iSafeKrnl
SYSTEM\CurrentControlSet\services\iSafeKrnlBoot
SYSTEM\CurrentControlSet\services\iSafeKrnlKit
SYSTEM\CurrentControlSet\services\iSafeKrnlR3
SYSTEM\CurrentControlSet\services\iSafeNetFilter
SYSTEM\CurrentControlSet\services\iSafeService

Directories

PUP.YAC (Yet Another Cleaner) may create the following directory or directories:

%ALLUSERSPROFILE%\Microsoft\Windows\Start Menu\Programs\YAC
%APPDATA%\Elex-tech
%AppData%\eCyber
%AppData%\iSafe
%PROGRAMFILES%\Elex-tech
%PROGRAMFILES%\iSafe
%PROGRAMFILES(x86)%\Elex-tech
%PROGRAMFILES(x86)%\iSafe
%TEMP%\iSafeRightKeyScan

Analysis Report

General information

Family Name: PUP.YAC (Yet Another Cleaner)
Signature status: Self Signed

Known Samples

MD5: d7c3ba6b7f1f34fd41fa1a6d50d3a996
SHA1: 6592ca274374ffaa9ff7eeb9f837ef44f3e5f14c
SHA256: 49FA607289E3AD1E1289E11381A9F94ECAB899CF2C0815E11B034AB3DC5813D8
File Size: 2.00 MB, 1999600 bytes

Windows Portable Executable Attributes

  • File doesn't have "Rich" header
  • File doesn't have debug information
  • File doesn't have exports table
  • File doesn't have relocations information
  • File is 32-bit executable
  • File is either console or GUI application
  • File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
  • File is Native application (NOT .NET application)
  • File is not packed
  • IMAGE_FILE_DLL is not set inside PE header (Executable)
Show More
  • IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)

File Icons

Windows PE Version Information

Name Value
Company Name Elex do Brasil Participações Ltda
File Description standard installer
File Version 1.0.107.22342
Legal Copyright Copyright 2011-2014 Elex do Brasil Participações Ltda. All rights reserved.
Product Name yacdl
Product Version 1.0.107.22342

Digital Signatures

Signer Root Status
Elex do Brasil Participações Ltda VeriSign Class 3 Code Signing 2010 CA Self Signed

Files Modified

File Attributes
\device\harddisk0\dr0 Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\local\temp\nsndc0b.tmp Synchronize,Write Attributes
c:\users\user\appdata\local\temp\nsndc0b.tmp\insertdlg.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsndc0b.tmp\insertdlg.dll Synchronize,Write Attributes
c:\users\user\appdata\local\temp\nsndc0b.tmp\system.dll Generic Write,Read Attributes
c:\users\user\appdata\local\temp\nsndc0b.tmp\system.dll Synchronize,Write Attributes
c:\users\user\appdata\local\temp\~dc4b Synchronize,Write Attributes
c:\users\user\appdata\local\temp\~dc4b\isafedownloader.exe Generic Write,Read Attributes
c:\users\user\appdata\local\temp\~dc4b\isafedownloader.exe Synchronize,Write Attributes
c:\users\user\appdata\local\temp\~dc4b\nsis_setup Generic Write,Read Attributes
Show More
c:\users\user\appdata\local\temp\~dc4b\nsis_setup Synchronize,Write Attributes
c:\users\user\appdata\local\temp\~dc4b\nsis_setup_deleted_ Synchronize,Write Attributes
c:\users\user\appdata\roaming\ecyber\log\isafedownloader.log Generic Read,Write Data,Write Attributes,Write extended,Append data
c:\users\user\appdata\roaming\ecyber\log\isafedownloader.log Synchronize,Write Attributes

Registry Modifications

Key::Value Data API Name
HKLM\system\controlset001\control\session manager::pendingfilerenameoperations \??\C:\Users\Tnztmopa\AppData\Local\Temp\nsnDC0B.tmp\insertdlg.dll RegNtPreCreateKey
HKLM\system\controlset001\control\session manager::pendingfilerenameoperations \??\C:\Users\Tnztmopa\AppData\Local\Temp\nsnDC0B.tmp\insertdlg.dll\??\C:\Users\Tnztmopa\AppData\Local\Temp\nsnDC0B.tmp\ RegNtPreCreateKey

Windows API Usage

Category API
Process Shell Execute
  • CreateProcess
Network Winsock2
  • WSAStartup
User Data Access
  • GetComputerName
  • GetUserName
Anti Debug
  • NtQuerySystemInformation
Network Wininet
  • HttpOpenRequest
  • HttpQueryInfo
  • HttpSendRequest
  • InternetConnect
  • InternetOpen
  • InternetReadFile
Network Winhttp
  • WinHttpOpen

Shell Command Execution

C:\Users\Tnztmopa\AppData\Local\Temp\~DC4B\iSafeDownloader.exe

Trending

Most Viewed

Loading...