Adware

Adware.PowerOffer.A removal instruction

Malware Removal

The Adware.PowerOffer.A is considered dangerous by lots of security experts. When this infection is active, you may notice unwanted processes in Task Manager list. In this case, it is adviced to scan your computer with GridinSoft Anti-Malware.

GridinSoft Anti-Malware

Gridinsoft Anti-Malware

Removing PC viruses manually may take hours and may damage your PC in the process. We recommend using GridinSoft Anti-Malware for virus removal. Allows to complete scan and cure your PC during the trial period.
6-day free trial available.

What Adware.PowerOffer.A virus can do?

  • Behavioural detection: Executable code extraction – unpacking
  • SetUnhandledExceptionFilter detected (possible anti-debug)
  • Scheduled file move on reboot detected
  • Yara rule detections observed from a process memory dump/dropped files/CAPE
  • Creates RWX memory
  • Guard pages use detected – possible anti-debugging.
  • Dynamic (imported) function loading detected
  • Reads data out of its own binary image
  • Drops a binary and executes it
  • The binary contains an unknown PE section name indicative of packing
  • Authenticode signature is invalid
  • Creates or sets a registry key to a long series of bytes, possibly to store a binary or malware config
  • Exhibits possible ransomware file modification behavior
  • Uses suspicious command line tools or Windows utilities

Related domains:

application.mibatech.com

How to determine Adware.PowerOffer.A?


File Info:

name: D7D4BC6F1717433001C8.mlw
path: /opt/CAPEv2/storage/binaries/d89475b063af7aae0a7a0b68f8731c6c2a021b5cd577b577f649c37f80dfe056
crc32: EB9129CC
md5: d7d4bc6f1717433001c874768ef41394
sha1: 029ab00a32a52fc55436623e26064fb98a0775b3
sha256: d89475b063af7aae0a7a0b68f8731c6c2a021b5cd577b577f649c37f80dfe056
sha512: dd70bcea302445acd6f2195ebb7bbe8f1723763222798a339a2bffe466acf08f9881f24586097fb322752479fc190c9a44d654edc632f2ff196df37e52fb47a8
ssdeep: 98304:IktGpr0y+pF2Qsng9JKpdnZUkNe3RdZDtnXvtSTviL0Jp4dhxOSsjqglP:tyroF7snIJcuBLpyviowhDQV
type: PE32 executable (GUI) Intel 80386, for MS Windows
tlsh: T19D56331E05A64B37D1E2CC36AA00F185146CE1909FF4E2FC3858979EAEF74C21BE5766
sha3_384: 9cee2edd74f18289bfe912824674441b80e100d9db9cd298fbfdc1b142b12ec2c141474981e129d7aac9eefa3b8027fc
ep_bytes: 558bec83c4c453565733c08945f08945
timestamp: 1992-06-19 22:22:17

Version Info:

Comments: This installation was built with Inno Setup.
CompanyName: UltraTorrent.org
FileDescription: UltraTorrent Setup
FileVersion:
LegalCopyright:
ProductName: UltraTorrent
ProductVersion:
Translation: 0x0000 0x04b0

Adware.PowerOffer.A also known as:

LionicAdware.MSIL.PowerOfr.2!c
FireEyeAdware.PowerOffer.A
ALYacAdware.PowerOffer.A
VIPREAdware.MSIL.PowerOfr
SangforAdware.MSIL.PowerOfr.a
BitDefenderAdware.PowerOffer.A
Cybereasonmalicious.f17174
SymantecPUA.Gen.2
ESET-NOD32a variant of MSIL/Adware.Agent.AP
Paloaltogeneric.ml
Kasperskynot-a-virus:AdWare.MSIL.PowerOfr.a
AlibabaAdWare:MSIL/PowerOfr.3e9ffec6
NANO-AntivirusRiskware.Win32.Generic.dbyfct
EmsisoftAdware.PowerOffer.A (B)
ComodoApplicUnwnt@#3b72l7ipch99
ZillyaAdware.PowerOfr.Win32.2
TrendMicroTROJ_GEN.R002C0OCV21
McAfee-GW-EditionArtemis!Trojan
SophosGeneric Reputation PUA (PUA)
WebrootW32.Malware.Gen
AviraTR/StartPage.alc.2
Antiy-AVLTrojan/Generic.ASMalwS.511730
MicrosoftTrojan:Win32/Emotet!ml
GridinsoftRansom.Win32.Occamy.sa
GDataWin32.Application.Agent.74WZS7
McAfeeArtemis!D7D4BC6F1717
MAXmalware (ai score=88)
VBA32Worm.MSIL.ShareWire
PandaTrj/OCJ.D
TencentMsil.Adware.Agent.Wtxc
YandexWorm.Agent!vZsqdlEvuN8
MaxSecureTrojan.Malware.12231689.susgen
FortinetAdware/MSIL_PowerOfr
AVGWin32:Malware-gen
AvastWin32:Malware-gen

How to remove Adware.PowerOffer.A?

Adware.PowerOffer.A removal tool
  • Download and install GridinSoft Anti-Malware.
  • Open GridinSoft Anti-Malware and perform a “Standard scan“.
  • Move to quarantine” all items.
  • Open “Tools” tab – Press “Reset Browser Settings“.
  • Select proper browser and options – Click “Reset”.
  • Restart your computer.

About the author

Paul Valéry

I'm a cyber security analyst and data science expert with 5+ years of experience with security software contractors.

Leave a Comment