general_hospital_14_feb_14.exe

INSTALL DOT EXE

This adware bundler is distributed through Adknowledge's advertising supported software managers. The application general_hospital_14_feb_14.exe, “Premium Installer ” by INSTALL DOT EXE has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Adknowledge Fusion installer. The file has been seen being downloaded from secure.4-pn-installer.com.
Publisher:
Premium Installer   (signed by INSTALL DOT EXE)

Product:
Premium Installer

Description:
Premium Installer

Version:
1.3.7.2

MD5:
6470769934fad03abbe208676ee5df07

SHA-1:
4dec59907b0eb159158e6051e54f578b13b0cb4e

SHA-256:
cc553870412a7099a1e6a6d27e335b64d200d0a9a509df2e2abe272d0b8b00d0

Scanner detections:
1 / 68

Status:
Adware

Explanation:
This installer bundles various adware prorgams that may include toolbars and web browser advertising injectors/extensions.

Description:
This is an installer which may bundle legitimate applications with offers for additional 3rd-party applications that may be unwanted by the user. While the installer contains an 'opt-out' feature this is not set be defult and is usually overlooked.

Analysis date:
12/26/2024 1:49:53 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Adknowledge.INSTALLD.Installer (M)
16.7.10.18

File size:
546.8 KB (559,912 bytes)

Product version:
1.3.7.2

Copyright:
Copyright (C) 2013 Premium Installer

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Adknowledge Fusion

Language:
English (United States)

Common path:
C:\users\{user}\downloads\general_hospital_14_feb_14.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
10/3/2013 7:00:00 PM

Valid to:
9/20/2014 6:59:59 PM

Subject:
CN=INSTALL DOT EXE, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=INSTALL DOT EXE, L=Kansas City, S=Missouri, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
4C8303B332693FCF64E1E7DFD7841493

File PE Metadata
Compilation timestamp:
2/21/2014 8:34:29 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
12288:nR8Na/pd2cJjcWPmGi22eLqBi1MNLyms/2imvrq+g/RwIY4AkseyLU8sbPmB8p0z:nR8NhWPmGi2aiBrKU8sbPmB7z

Entry address:
0x3D168

Entry point:
E8, C7, 60, 00, 00, E9, 78, FE, FF, FF, 6A, 0C, 68, A8, 9D, 47, 00, E8, CA, 09, 00, 00, 83, 65, E4, 00, 8B, 75, 08, 3B, 35, 18, 43, 48, 00, 77, 22, 6A, 04, E8, CA, 62, 00, 00, 59, 83, 65, FC, 00, 56, E8, 2C, 70, 00, 00, 59, 89, 45, E4, C7, 45, FC, FE, FF, FF, FF, E8, 09, 00, 00, 00, 8B, 45, E4, E8, D6, 09, 00, 00, C3, 6A, 04, E8, AD, 61, 00, 00, 59, C3, 8B, FF, 55, 8B, EC, 83, 3D, 74, 2F, 48, 00, 00, 75, 18, E8, 02, 56, 00, 00, 6A, 1E, E8, 2A, 54, 00, 00, 68, FF, 00, 00, 00, E8, 44, 21, 00, 00, 59, 59, A1...
 
[+]

Entropy:
6.4337

Code size:
409.5 KB (419,328 bytes)

The file general_hospital_14_feb_14.exe has been seen being distributed by the following URL.

Remove general_hospital_14_feb_14.exe - Powered by Reason Core Security