dqmoqccdao.exe

HD4Good

Buca Apps

The application dqmoqccdao.exe, “HD4Good Installer” has been detected as adware by 23 anti-malware scanners. The program is a setup application that uses the Nullsoft Install System installer, however the file is not signed with an authenticode signature from a trusted source. It is built using the Crossrider cross-browser extension platform. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider. It is also typically executed from the user's temporary directory. While running, it connects to the Internet address hwcdn.net on port 80 using the HTTP protocol.
Publisher:
Buca Apps

Product:
HD4Good

Description:
HD4Good Installer

Version:
1.36.01.22

MD5:
e05064ccfaf866f4d10e6d03dc4a1e29

SHA-1:
9614d850c699193da4dcec5242726aaf70e39dc0

SHA-256:
b6bba221ae97099ef82063f29897eb6ade250619953529c64b641649f1dde3f3

Scanner detections:
23 / 68

Status:
Adware

Explanation:
This is part of the Crossrider Internet browser extension framework which may modify the user's web browser settings including changing the home and search pages.

Note:
Crossrider is the owner of a platform that enables the creation of cross-browser extensions by developers but is not the owner of this detected application.

Analysis date:
11/23/2024 10:56:32 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.JS.Agent.AM
5727669

Agnitum Outpost
PUA.Toolbar.CrossRider
7.1.1

AhnLab V3 Security
PUP/Win32.CrossRider
2015.06.10

Avira AntiVirus
ADWARE/CrossRider.Gen7
8.3.1.6

avast!
Crossrider-ES [PUP]
150602-1

AVG
Crossrider
2016.0.3083

Dr.Web
infected with Trojan.Crossrider.46916
9.0.1.05190

ESET NOD32
Win32/Toolbar.CrossRider.CM potentially unwanted application
7.0.302.0

G Data
Script.Application.Plush
15.6.25

Malwarebytes
PUP.Optional.HD4Good.A
v2015.06.09.08

McAfee
Trojan.Artemis!7EE42381E69E
17.6.569.0

MicroWorld eScan
Adware.JS.Crossrider.B
16.0.0.480

NANO AntiVirus
Trojan.Win32.Toolbar.dryefh
0.30.24.1636

Panda Antivirus
Trj/Genetic.gen
15.06.09.08

Qihoo 360 Security
HEUR/QVM30.1.Malware.Gen
1.0.0.1015

Quick Heal
JS.Adware.CrossRider.A
6.15.14.00

Reason Heuristics
PUP.Downloader.Installer.Buca
15.6.9.20

Rising Antivirus
PE:Malware.Adwapper!6.2201
23.00.65.15607

Trend Micro House Call
Suspici.CD691FD1
7.2.160

Trend Micro
ADW_CROSSRIDER
10.465.09

Vba32 AntiVirus
suspected of Trojan.Downloader.gen.h
3.12.26.4

VIPRE Antivirus
Threat.4150696
40830

Zillya! Antivirus
Trojan.BlackGen.Win32.11
2.0.0.2215

File size:
10.4 MB (10,923,380 bytes)

Copyright:
Copyright Buca Apps

File type:
Executable application (Win32 EXE)

Installer:
Nullsoft Install System

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\dqmoqccdao.exe

File PE Metadata
Compilation timestamp:
12/4/2012 1:55:02 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.22

CTPH (ssdeep):
196608:rD+JI2f9tv+zbZtxQEu5TKKP8DbFybtZwRm7a4DKXfrR7PQNbnyIRtXxzFnKUhw:/+26tvwvuuD4bDXuvrRY9njXbnKaw

Entry address:
0x4323

Entry point:
55, 89, E5, 57, 56, 53, 81, EC, AC, 01, 00, 00, FF, 15, 74, C3, 44, 00, C7, 04, 24, 01, 80, 00, 00, FF, 15, 58, C4, 44, 00, 53, C7, 04, 24, 00, 00, 00, 00, FF, 15, 98, C4, 44, 00, 56, A3, 40, 3B, 44, 00, C7, 04, 24, 08, 00, 00, 00, E8, 8D, 3B, 00, 00, A3, 9C, 3B, 44, 00, 8D, 85, 84, FE, FF, FF, 57, C7, 44, 24, 10, 00, 00, 00, 00, C7, 44, 24, 0C, 60, 01, 00, 00, 89, 44, 24, 08, C7, 44, 24, 04, 00, 00, 00, 00, C7, 04, 24, 01, B3, 40, 00, FF, 15, AC, C4, 44, 00, 83, EC, 14, C7, 44, 24, 04, 02, B3, 40, 00, C7...
 
[+]

Entropy:
7.9989  (probably packed)

Code size:
34.5 KB (35,328 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to s3-website-us-east-1.amazonaws.com  (54.231.13.60:80)

TCP (HTTP):
Connects to hwcdn.net  (69.16.175.10:80)

TCP (HTTP):
Connects to ec2-54-221-208-29.compute-1.amazonaws.com  (54.221.208.29:80)

Remove dqmoqccdao.exe - Powered by Reason Core Security