_150276174144710646145gc.exe

Installer

The application _150276174144710646145gc.exe by Installer has been detected as adware by 6 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. The installer uses the InstallMonetizer platform which will donwload and install adware toolbars and other potentially unwanted software offers during setup. The file has been seen being downloaded from onecall.installer.download.com and multiple other hosts.
Publisher:
Installer  (signed and verified)

MD5:
edf4f9c2c96bff4f35dd674ff261f73a

SHA-1:
dc87c0c534d89b0997ea30ab3aaeebb6eaf51783

SHA-256:
7b9259b507702113343cf54695162689d4649dc9da63202a96e090cd472cd845

Scanner detections:
6 / 68

Status:
Adware

Explanation:
Uses the InstallMonetizer distribution platform to bundle adware.

Analysis date:
12/24/2024 11:40:04 AM UTC  (today)

Scan engine
Detection
Engine version

avast!
Malware-gen
140813-1

Clam AntiVirus
Win.Trojan.Wpbrutebot-2
0.98/19297

ESET NOD32
Win32/InstallMonetizer.AZ potentially unwanted application
7.0.302.0

Reason Heuristics
PUP.Installer.Y
14.8.31.22

Rising Antivirus
NS:PUF.SilenceInstaller!1.9DDF
23.00.65.14820

VIPRE Antivirus
Threat.4866784
32210

File size:
715.3 KB (732,496 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\downloads\_150276174144710646145gc.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
1/8/2014 6:00:00 PM

Valid to:
1/9/2015 5:59:59 PM

Subject:
CN=Installer, O=Installer, STREET=5655 Silver Creek Valley Road, L=San Jose, S=CA/Santa Clara, PostalCode=95138, C=US

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00A38705F2C2D84829915877C84CAD2D2E

File PE Metadata
Compilation timestamp:
12/5/2009 4:52:12 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:dt0DJT7ZCipmVp1whyVq9t2KiNrncTajAIzTNeVuJd5A8gvVbJd5A89:4KwhOq9mJcTajAI3gVuJd5A8gvVbJd5b

Entry address:
0x30FA

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 18, 1C, 45, 00, E8, F1, 2B, 00, 00, A3, 64, 1B, 45, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 98, 37, 43, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 60, DB, 44, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, A0, 47, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Entropy:
7.9487

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

The file _150276174144710646145gc.exe has been seen being distributed by the following 3 URLs.

Remove _150276174144710646145gc.exe - Powered by Reason Core Security