SuperWeb
Threat Scorecard
EnigmaSoft Threat Scorecard
EnigmaSoft Threat Scorecards are assessment reports for different malware threats which have been collected and analyzed by our research team. EnigmaSoft Threat Scorecards evaluate and rank threats using several metrics including real-world and potential risk factors, trends, frequency, prevalence, and persistence. EnigmaSoft Threat Scorecards are updated regularly based on our research data and metrics and are useful for a wide range of computer users, from end users seeking solutions to remove malware from their systems to security experts analyzing threats.
EnigmaSoft Threat Scorecards display a variety of useful information, including:
Popularity Rank: The ranking of a particular threat in EnigmaSoft’s Threat Database.
Severity Level: The determined severity level of an object, represented numerically, based on our risk modeling process and research, as explained in our Threat Assessment Criteria.
Infected Computers: The number of confirmed and suspected cases of a particular threat detected on infected computers as reported by SpyHunter.
See also Threat Assessment Criteria.
| Popularity Rank: | 1,209 |
| Threat Level: | 20 % (Normal) |
| Infected Computers: | 315,948 |
| First Seen: | October 14, 2013 |
| Last Seen: | February 2, 2026 |
| OS(es) Affected: | Windows |
considered a Potentially Unwanted Program. SuperWeb usually enters a computer bundled with other software. Once SuperWeb has been installed, SuperWeb may make changes to the affected Web browser that causes numerous problems on the affected computer. The point of SuperWeb and symptoms associated with this PUP is to expose computer users to marketing or advertising material. SuperWeb can make it very hard for computer users to use the affected Web browser effectively since many of SuperWeb's symptoms may interrupt the affected computer user's activities and make it difficult to access unrelated websites normally. Malware analysts recommend the immediate removal of SuperWeb with the help of a fully updated anti-malware application.
Table of Contents
SuperWeb – The Adware without Super Powers
A large number of symptoms that may be associated with SuperWeb have been noticed. The following are symptoms that may be associated with SuperWeb and similar adware threats:
- SuperWeb makes various changes to your Web browser and system settings.
- SuperWeb can affect your Web browser and the computer's performance. The SuperWeb adware may cause the affected Web browser to freeze or crash at random intervals.
- SuperWeb may make your Web browser more vulnerable to other threats by decreasing its security settings and preventing computer users from visiting certain websites or launch certain applications.
- SuperWeb may change your Web browser's default search engine and home page. This makes it possible for SuperWeb to expose computer users to potentially unsafe online content when the affected Web browser is launched.
- SuperWeb may cause browser redirects, forcing computer users to visit SuperWeb's related websites repeatedly.
- SuperWeb may cause affected Web browsers to display pop-up windows and advertisements.
If SuperWeb is installed on your Web browser, it is important to remove SuperWeb immediately with the help of a reliable anti-malware program. In many cases, SuperWeb may make changes to your Web browser that should be removed manually even after SuperWeb has been uninstalled. To prevent future SuperWeb infections, always download software from reliable, reputable sources and use custom installation to ensure that no unwanted components, such as SuperWeb or other PUPs, are also being installed on your computer.
SpyHunter Detects & Remove SuperWeb
File System Details
| # | File Name | MD5 |
Detections
Detections: The number of confirmed and suspected cases of a particular threat detected on
infected computers as reported by SpyHunter.
|
|---|---|---|---|
| 1. | CommonShare.BrowserAdapter.exe | 59de06fe556c7ec3cd018d82eab71bb3 | 1,190 |
| 2. | utilCommonShare.exe | 891329b7b6b8452414eb845abb14def9 | 846 |
| 3. | HoldPage.expext.exe.vir | b8d1984f7ecaff442f63253ed81a6a50 | 807 |
| 4. | CommonShare.BrowserAdapter64.exe | a81f9ceda5070504eff0a1e7d09997a8 | 702 |
| 5. | HoldPage.BrowserAdapter.exe | afe8668cce6cc3bd72a3a03616a4d9be | 535 |
| 6. | SmarterPower.BrowserAdapter.exe | 0e74af254cd319c7c66cc8d724584083 | 392 |
| 7. | DynamoCombo.BrowserAdapter.exe | 238c27d59df09b84bebd73c3372ed759 | 358 |
| 8. | SolutionReal.BrowserAdapter.exe | a731f5f89d6ce12ecb8b6a1566349f20 | 350 |
| 9. | CommonShare.PurBrowse64.exe | 56939125c535702b818999da70f5f255 | 348 |
| 10. | {2b929fe1-284b-4766-afb9-19b0915b99b0}w64.sys | 8349d0da50d0c789e572a275acb7eb76 | 336 |
| 11. | {2b929fe1-284b-4766-afb9-19b0915b99b0}Gw64.sys | 57493352c11f1e4f755b84a6817f4ea6 | 327 |
| 12. | HoldPage.PurBrowse64.exe | 3d4584f6afa551723fba8bc009756150 | 325 |
| 13. | LinkSwift.expext.exe | ab99c331fe1edcd8a2824056ad0c03e1 | 285 |
| 14. | plugincontainer.exe | b2052586345a37c1b7b5ba132c1928c5 | 285 |
| 15. | AppBud.PurBrowse64.exe | d537d5453272d535f3f74871ee566e0a | 278 |
| 16. | plugin.exe | 6092e7cac117597778b82a79da8a620b | 272 |
| 17. | snipsmart.expext.exe | c7ea05d1a3d6410a828dbfed4064a719 | 271 |
| 18. | {5eeb83d0-96ea-4249-942c-beead6847053}Gw64.sys | f177bb280d7b2361db7b5833965c5cc1 | 268 |
| 19. | HoldPage.expext.exe | e0cdd316ba7f04718ae501a2fa125923 | 256 |
| 20. | DynamoCombo.expext.exe | 53af70b8c7e99cea638e151d113feb75 | 250 |
| 21. | SolutionReal.expext.exe | eeea87863384b3a6b93d08ddd72d89ad | 245 |
| 22. | DynamoCombo.BrowserAdapter64.exe | 6c7b623ff56e22376b8f3953e53e56e4 | 216 |
| 23. | SolutionReal.BrowserAdapter64.exe | 7888e716624bbc432387e4a439cb71a5 | 215 |
| 24. | HoldPage.BrowserAdapter64.exe | e96a06378cb9532066b7b5414a185eb7 | 201 |
| 25. | LinkSwift.BrowserAdapter64.exe | 7449473c01ead70c6735e3dc23279b6d | 194 |
| 26. | FramedDisplay.BrowserAdapter64.exe | f90b5e39a2ba19fea6ec4fae10dd7c30 | 178 |
| 27. | adv_111.exe | a8b6cacd8df3bb464292cfe3f3db30ad | 1 |
| 28. | updater.exe | 9cadc71e8a5d8633449149979cd0adaf | 1 |
Registry Details
Directories
SuperWeb may create the following directory or directories:
| %COMMONPROGRAMFILES%\475a9272-9606-46f5-b309-fdfc084777bf |
| %COMMONPROGRAMFILES%\9466af57-1f38-4973-ab1c-22f7e17e2d6a |
| %COMMONPROGRAMFILES(x86)%\475a9272-9606-46f5-b309-fdfc084777bf |
| %COMMONPROGRAMFILES(x86)%\9466af57-1f38-4973-ab1c-22f7e17e2d6a |
Analysis Report
General information
| Family Name: | Adware.SuperWeb |
|---|---|
| Signature status: | Self Signed |
Known Samples
Known Samples
This section lists other file samples believed to be associated with this family.|
MD5:
94254bc59d831c6da6e1e82ebd881cdf
SHA1:
7502c1eb81871a148c6428c70adcf131bac87333
File Size:
123.62 KB, 123624 bytes
|
|
MD5:
8b01fe932b870b042fadf1d666fb1a5c
SHA1:
750441d966ab4d5ac9506b08262c339b61c48bd2
File Size:
511.20 KB, 511200 bytes
|
|
MD5:
e8d07d009370a8a2ef7146fd7166eb54
SHA1:
47690b46707ba426c4bd511d134593d1288101e8
File Size:
565.52 KB, 565520 bytes
|
|
MD5:
1bdc7669943dcbe639a140e1c2db8a7a
SHA1:
2a6e22e88e4721d20336e788da7f2761fe114cc7
File Size:
298.95 KB, 298952 bytes
|
|
MD5:
7ebd050e2e6e1d71acccdb38fb22c3c6
SHA1:
9e7f0e18c40ce73f3d83dbc7881e14fea13b85d5
File Size:
556.30 KB, 556304 bytes
|
Show More
|
MD5:
e38dbe40cc4a47c6fd54bde372e0d86f
SHA1:
1d9fe3cfc948a5c2811d71029920e82476c3dadc
File Size:
96.54 KB, 96544 bytes
|
|
MD5:
6097f92c78c8f0bd7cd06364e7b9ce4e
SHA1:
5f8a18c32b203dc19404a5d3836ae7e18d5f502e
SHA256:
C9A95560D4C2F2B4D4C46CD2BFC190A2382D0ACFD1CF2C574A068B532CFD0CF4
File Size:
128.20 KB, 128200 bytes
|
|
MD5:
a1edf5ea201a2ce45514bcdfe57e6a23
SHA1:
c828e49499e3964c8b84e8474bd9384e57b08a51
SHA256:
61AB4EA38F133A6A5A6C4183678EE908A337CB42434DA43921618501A6261553
File Size:
299.11 KB, 299112 bytes
|
|
MD5:
8f8ff52a6ad78acc04cf446aab01f6d2
SHA1:
a10003f95985f265566f71397a79dc633f8a13f7
SHA256:
C8AD7995888A215096F1F76266CD5954FCEC8ACB3FD3F8BBE3873F56B0D2B34E
File Size:
728.29 KB, 728288 bytes
|
|
MD5:
c7870749b26252895e82e1648af39818
SHA1:
00ee9d363de8cb9f0227bde3705645fe0115fc87
SHA256:
C5D2FEE7F1ABF6FDCDD2AFFE78EA248B779BC328865A62061BCCC7767998F356
File Size:
128.20 KB, 128200 bytes
|
|
MD5:
99e27a14f430138ee9f7e93d22f4f95b
SHA1:
a9b3fa80a0e636297d6ac2629cbeef445ae2c40a
SHA256:
A9E5104D8FA6E6C1AA092FC9EE9FAF001B4BC5C4EFAC5A5E9CD1E0272CFCAB17
File Size:
583.49 KB, 583488 bytes
|
|
MD5:
69c7d595c572ac7b6af0a64550fc2559
SHA1:
50fdf6042a1ed47112b9dbea1e2a8c5b74ec27ad
SHA256:
0BE7E155C86FB85FD4EB99CD7F8FF9015CAEBA36C82CDE85A260393CDD12B652
File Size:
579.82 KB, 579816 bytes
|
|
MD5:
ce7e988f9efd05a732d271e03c320627
SHA1:
dd1573697e77e38625ac627e23cced46754d7746
SHA256:
D0433917CF82EB560DC66076C3BBF6F3FA80B0C7F1B3A605467EED476038D298
File Size:
509.70 KB, 509704 bytes
|
|
MD5:
a1562d710fb7c23982fbc5df28774a7f
SHA1:
4f17495498440b8c24b49544f2d1bdf2a8af8448
SHA256:
3B7636CD1BAA3DAA25B23F96907599867F4E9DCDED5564E6EFD868B79D2EAE41
File Size:
577.24 KB, 577240 bytes
|
|
MD5:
40ce2561fe1c672961a1b803b58f9416
SHA1:
2ba141911fe68e35b41e7747eb1e5617155d4033
SHA256:
3F51CDEDC096711612393E14C4ADFC4275A1E81A7F860B44C78016DB6707792B
File Size:
579.30 KB, 579296 bytes
|
|
MD5:
303cc5f72ea349c902bfc5c5d4786050
SHA1:
11938fb6c2c995b3edf0fbf02e5466e7f5a1bd66
SHA256:
3946D2C5253376EDFB9A4831930EB87A45854152268C42E1D41BA514333086A2
File Size:
1.65 MB, 1649904 bytes
|
|
MD5:
ea787b0e1ad0c6dfe45894023e11f7b2
SHA1:
d8ee0c261d21dbe7bd737604c927708dbf16149f
SHA256:
F51141C319A527B43585D61E0B14645B8F974E89D3A4FEE37D981B71ED361B8B
File Size:
55.52 KB, 55520 bytes
|
|
MD5:
6dd5ba7c6a3035c314a9c5dd2db63e76
SHA1:
8c321113efdb61e337e714a8401de9950cf17d32
SHA256:
88A07951A03C07CD6CBF74590A8644122F6C963DFC115F3A73897B7945A10C54
File Size:
571.61 KB, 571608 bytes
|
|
MD5:
a73435a4bfd4183d23b1458ae4e89b98
SHA1:
5172fe2c99c406acbea1edbb343b8c6de958b8ea
SHA256:
80DB379FC5E30CC107A5C9B5FED46FF89719F330BECDA4B4CB28838D9BDE7498
File Size:
649.45 KB, 649448 bytes
|
|
MD5:
e78fbe2933776e5dd5ed3c6f5fe77494
SHA1:
d978322b428cd0d3823249c5b2afc81ffa825203
SHA256:
E6A96C9382226A05103687B270D8857867088533D50FF8C95557FC94F7566453
File Size:
546.02 KB, 546016 bytes
|
|
MD5:
5d019fe009a94e4edc05576227fd243e
SHA1:
89128c35168843528b054fbc582eed4c34db557e
SHA256:
8AF8CB7270499FD3FDF588624E455FFEAEB1F7FF2F303CE92103EA3AC53CBCEA
File Size:
56.54 KB, 56544 bytes
|
|
MD5:
e9e1f0477b1cee66462e8690763603d7
SHA1:
a023e2a6d6bf7d3f798f92c66e466f7ee45860fd
SHA256:
99A202A19C602782E5BC05A289D28B7C771F53512B96283231A4E11311B79B52
File Size:
1.04 MB, 1036512 bytes
|
|
MD5:
72bffdbd221f571dc204cbddcbf5aa37
SHA1:
065ae68ea18cefb49a05f4759616c4832635cd27
SHA256:
CE02EABF0E4932FAFA0BAE2D9113119A72806518FAF4F3BE9AFB0F080AD406F8
File Size:
1.09 MB, 1094376 bytes
|
|
MD5:
091723fe610307a74ea97fe6012bd962
SHA1:
778b66dc1b48cbb43751478a44ba7ef8f7643768
SHA256:
C362009782C8F8E7A109DFAAF017EFA1D4D65A276E6D938E998377282913A292
File Size:
56.54 KB, 56536 bytes
|
|
MD5:
36ee3e1b531d7f5a71ddedf1f7f67bfb
SHA1:
443dac0c883d3f0984bcc7728f92ff076b86e1ef
SHA256:
595FA8F2EB63BDAF8895D32E59D3C8E6C5D7D939C74BBC42AC81B7B7E2B6619A
File Size:
556.26 KB, 556264 bytes
|
|
MD5:
cf96bc46b38adfa45316a3a4da632f1f
SHA1:
49fcf19478c047cbc90a632424c1c6c5e52dd096
SHA256:
3002645E94866DF930073E106337D472BBE6FE5D43FD8797583D77C644794BE7
File Size:
123.64 KB, 123640 bytes
|
|
MD5:
661c3e773193ada19cbfec21a4c467cb
SHA1:
2e8293a28cf72a4e66c330386e1e78d39e02fc8d
SHA256:
A72B7DBFEC9F35AC3229F6E64EF5C81C0B7F6C59BA23306F354AA5E5E16C002B
File Size:
583.46 KB, 583464 bytes
|
|
MD5:
db4f9890e99a2b4f1dd77b155888fba9
SHA1:
b54c336ae391e08ed52297aa35125517311550ad
SHA256:
30FDFF33955BEC7553B22249FAE5A77B8EB1FEA44BDE0F2700E57B15396BD006
File Size:
56.54 KB, 56544 bytes
|
|
MD5:
9908e0dfcac7d2948f2bc754c14039a7
SHA1:
22032b98e8adc2f3500d383ea763a3d8d448861e
SHA256:
2A18ED70568FCCEC157471D0659351E01CE399F60415900EDBB757797F4AB84A
File Size:
197.36 KB, 197360 bytes
|
|
MD5:
2c24c95f14c3a172fc3d64d343d463dd
SHA1:
d0d0f2181e57265c16919e001601891ffd188442
SHA256:
7ABCAF06277B7F09869825268907388A5A2E95A11F5E0C3B278336103BDA45EE
File Size:
643.82 KB, 643816 bytes
|
|
MD5:
fcc1dc081e75cbd763b875a0677ed834
SHA1:
145f0cd095e82386d42d6f27056e2083da372fff
SHA256:
108B3A9FCFD3BA3568DE96A6D77447ED49C9116C18D81138A85C594F85747F71
File Size:
57.02 KB, 57024 bytes
|
Windows Portable Executable Attributes
- File doesn't have "Rich" header
- File doesn't have debug information
- File doesn't have exports table
- File doesn't have relocations information
- File has exports table
- File has TLS information
- File is 32-bit executable
- File is 64-bit executable
- File is either console or GUI application
- File is GUI application (IMAGE_SUBSYSTEM_WINDOWS_GUI)
Show More
- File is Native application (NOT .NET application)
- File is not packed
- IMAGE_FILE_DLL is not set inside PE header (Executable)
- IMAGE_FILE_EXECUTABLE_IMAGE is set inside PE header (Executable Image)
File Icons
File Icons
This section displays icon resources found within family samples. Malware often replicates icons commonly associated with legitimate software to mislead users into believing the malware is safe.Windows PE Version Information
Windows PE Version Information
This section displays values and attributes that have been set in the Windows file version information data structure for samples within this family. To mislead users, malware actors often add fake version information mimicking legitimate software.| Name | Value |
|---|---|
| File Version |
Show More
|
| Product Version |
Show More
|
Digital Signatures
Digital Signatures
This section lists digital signatures that are attached to samples within this family. When analyzing and verifying digital signatures, it is important to confirm that the signature’s root authority is a well-known and trustworthy entity and that the status of the signature is good. Malware is often signed with non-trustworthy “Self Signed” digital signatures (which can be easily created by a malware author with no verification). Malware may also be signed by legitimate signatures that have an invalid status, and by signatures from questionable root authorities with fake or misleading “Signer” names.| Signer | Root | Status |
|---|---|---|
| AppEnable | VeriSign Class 3 Code Signing 2010 CA | Self Signed |
| Arctic World | VeriSign Class 3 Code Signing 2010 CA | Self Signed |
| Bar None Deals | VeriSign Class 3 Code Signing 2010 CA | Self Signed |
| Bizzybolt | VeriSign Class 3 Code Signing 2010 CA | Self Signed |
| Bolt View | VeriSign Class 3 Code Signing 2010 CA | Self Signed |
Show More
| BrowseStudio | VeriSign Class 3 Code Signing 2010 CA | Self Signed |
| Buy List | VeriSign Class 3 Code Signing 2010 CA | Self Signed |
| Cat Dog | VeriSign Class 3 Code Signing 2010 CA | Self Signed |
| ClearThink | VeriSign Class 3 Code Signing 2010 CA | Self Signed |
| Digital More | VeriSign Class 3 Code Signing 2010 CA | Self Signed |
| Filter Results | VeriSign Class 3 Code Signing 2010 CA | Self Signed |
| Fortunitas | VeriSign Class 3 Code Signing 2010 CA | Self Signed |
| General Buddy | VeriSign Class 3 Code Signing 2010 CA | Self Signed |
| Group Showcase | VeriSign Class 3 Code Signing 2010 CA | Self Signed |
| Jazz Spot | VeriSign Class 3 Code Signing 2010 CA | Self Signed |
| Magical Find | VeriSign Class 3 Code Signing 2010 CA | Self Signed |
| Middle Rush | VeriSign Class 3 Code Signing 2010 CA | Self Signed |
| Perfect Bid | VeriSign Class 3 Code Signing 2010 CA | Self Signed |
| Pulse Rate | VeriSign Class 3 Code Signing 2010 CA | Self Signed |
| Razor Web | VeriSign Class 3 Code Signing 2010 CA | Self Signed |
| Shop Essentials | VeriSign Class 3 Code Signing 2010 CA | Self Signed |
| Spend City | VeriSign Class 3 Code Signing 2010 CA | Self Signed |
| SunriseBrowse | VeriSign Class 3 Code Signing 2010 CA | Self Signed |
| Tech Missions | VeriSign Class 3 Code Signing 2010 CA | Self Signed |
| browse pulse | VeriSign Class 3 Code Signing 2010 CA | Self Signed |
| outobox | VeriSign Class 3 Code Signing 2010 CA | Self Signed |
Block Information
Block Information
During analysis, EnigmaSoft breaks file samples into logical blocks for classification and comparison with other samples. Blocks can be used to generate malware detection rules and to group file samples into families based on shared source code, functionality and other distinguishing attributes and characteristics. This section lists a summary of this block data, as well as its classification by EnigmaSoft. A visual representation of the block data is also displayed, where available.| Total Blocks: | 371 |
|---|---|
| Potentially Malicious Blocks: | 142 |
| Whitelisted Blocks: | 229 |
| Unknown Blocks: | 0 |
Visual Map
? - Unknown Block
x - Potentially Malicious Block
Similar Families
Similar Families
This section lists other families that share similarities with this family, based on EnigmaSoft’s analysis. Many malware families are created from the same malware toolkits and use the same packing and encryption techniques but uniquely extend functionality. Similar families may also share source code, attributes, icons, subcomponents, compromised and/or invalid digital signatures, and network characteristics. Researchers leverage these similarities to rapidly and effectively triage file samples and extend malware detection rules.- Agent.WO
- Chapak.DA
- Farfli.NB
- Filecoder.GAA
- GandCrab.CC
Show More
- Kryptik.FGSM
- Montiera.A
- ShellcodeRunner.FN
- SuperWeb.CC
- Superweb.C
- Superweb.CA
- Superweb.CE
- Superweb.D
- Ursnif.AD
- Ursnif.XB
Files Modified
Files Modified
This section lists files that were created, modified, moved and/or deleted by samples in this family. File system activity can provide valuable insight into how malware functions on the operating system.| File | Attributes |
|---|---|
| \device\namedpipe | Generic Read,Write Attributes |
| \device\namedpipe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\browsestudio\browsestudio.mg.exe | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\get the results hub\temp.txt | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\get the results hub\temp.txt | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\ilg | Generic Read,Write Data,Write Attributes,Write extended,Append data |
| c:\users\user\appdata\local\temp\magical find\temp.txt | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsa489e.tmp\ipconfig.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsa489e.tmp\nsisencrypt.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsa489e.tmp\system.dll | Generic Write,Read Attributes |
Show More
| c:\users\user\appdata\local\temp\nsa489e.tmp\userinfo.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsg5b22.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsg5b22.tmp\inetc.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsg5b22.tmp\inetc.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsg5b22.tmp\system.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsg5b22.tmp\system.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsga906.tmp | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsga906.tmp\inetc.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsga906.tmp\inetc.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsga906.tmp\system.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsga906.tmp\system.dll | Synchronize,Write Attributes |
| c:\users\user\appdata\local\temp\nsl5c89.tmp\execdos.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsl5c89.tmp\ipconfig.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsl5c89.tmp\nsisencrypt.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsl5c89.tmp\system.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsl5c89.tmp\userinfo.dll | Generic Write,Read Attributes |
| c:\users\user\appdata\local\temp\nsl5c89.tmp\wmiinspector.dll | Generic Write,Read Attributes |
Registry Modifications
Registry Modifications
This section lists registry keys and values that were created, modified and/or deleted by samples in this family. Windows Registry activity can provide valuable insight into malware functionality. Additionally, malware often creates registry values to allow itself to automatically start and indefinitely persist after an initial infection has compromised the system.| Key::Value | Data | API Name |
|---|---|---|
| HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\content::cacheprefix | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\cookies::cacheprefix | Cookie: | RegNtPreCreateKey |
| HKCU\software\microsoft\windows\currentversion\internet settings\5.0\cache\history::cacheprefix | Visited: | RegNtPreCreateKey |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::proxybypass | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::intranetname | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::uncasintranet | RegNtPreCreateKey | |
| HKCU\software\microsoft\windows\currentversion\internet settings\zonemap::autodetect | RegNtPreCreateKey | |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Users\Esigcqaj\AppData\Local\Temp\nsg5B22.tmp\ | RegNtPreCreateKey |
| HKLM\system\controlset001\control\session manager::pendingfilerenameoperations | \??\C:\Users\Mmrppinj\AppData\Local\Temp\nsgA906.tmp\ | RegNtPreCreateKey |
Windows API Usage
Windows API Usage
This section lists Windows API calls that are used by the samples in this family. Windows API usage analysis is a valuable tool that can help identify malicious activity, such as keylogging, security privilege escalation, data encryption, data exfiltration, interference with antivirus software, and network request manipulation.| Category | API |
|---|---|
| User Data Access |
|
| Encryption Used |
|
| Network Winhttp |
|
| Network Wininet |
|
| Process Manipulation Evasion |
|
| Process Shell Execute |
|
| Syscall Use |
Show More
61 additional items are not displayed above. |
| Anti Debug |
|
Shell Command Execution
Shell Command Execution
This section lists Windows shell commands that are run by the samples in this family. Windows Shell commands are often leveraged by malware for nefarious purposes and can be used to elevate security privileges, download and launch other malware, exploit vulnerabilities, collect and exfiltrate data, and hide malicious activity.
BrowseStudio.mg.exe -session 5F4BF7AA-7226-4491-8453-BEAD69050309 -ma -s is -cid
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\50fdf6042a1ed47112b9dbea1e2a8c5b74ec27ad_0000579816.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\4f17495498440b8c24b49544f2d1bdf2a8af8448_0000577240.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\2ba141911fe68e35b41e7747eb1e5617155d4033_0000579296.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\d8ee0c261d21dbe7bd737604c927708dbf16149f_0000055520.,LiQMAxHB
|
Show More
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\d978322b428cd0d3823249c5b2afc81ffa825203_0000546016.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\89128c35168843528b054fbc582eed4c34db557e_0000056544.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\778b66dc1b48cbb43751478a44ba7ef8f7643768_0000056536.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\443dac0c883d3f0984bcc7728f92ff076b86e1ef_0000556264.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\b54c336ae391e08ed52297aa35125517311550ad_0000056544.,LiQMAxHB
|
C:\WINDOWS\SysWOW64\rundll32.exe C:\WINDOWS\system32\rundll32.exe c:\users\user\downloads\145f0cd095e82386d42d6f27056e2083da372fff_0000057024.,LiQMAxHB
|