google_adwords_editor_10.1_setup.exe

Secure Labs Payments, S.L.

The application google_adwords_editor_10.1_setup.exe by Secure Labs Payments, S.L has been detected as a potentially unwanted program by 8 anti-malware scanners. The program is a setup application that uses the Nullsoft Install System installer. The file has been seen being downloaded from d.gostaller.com.
Publisher:
Secure Labs Payments, S.L.  (signed and verified)

MD5:
0f94a7411c5570b08e5b881eb7c4af32

SHA-1:
c43a8ad03304b511cea69116f5c0c2e0754cc7dd

SHA-256:
b058b1dbce0575780b4457e2b00cdb5dcb59fd7e46b862967a95083731bc8a18

Scanner detections:
8 / 68

Status:
Potentially unwanted

Analysis date:
12/26/2024 3:30:35 AM UTC  (today)

Scan engine
Detection
Engine version

avast!
Win32:Malware-gen
2014.9-140916

AVG
Win.Threat.Medium
2014.0.4015

Bkav FE
HW32.Paked
1.3.0.4959

ESET NOD32
Win32/DownWare.J potentially unwanted application
7.0.302.0

Norman
Downware.PQ
11.20140916

Rising Antivirus
PE:Trojan.Win32.Generic.137A42C9!326779593
23.00.65.14914

SUPERAntiSpyware
Trojan.Agent/Gen-Artemis
10355

VIPRE Antivirus
Threat.4150696
32938

File size:
196.2 KB (200,944 bytes)

File type:
Executable application (Win32 EXE)

Installer:
Nullsoft Install System

Common path:
C:\users\{user}\downloads\google_adwords_editor_10.1_setup.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
8/23/2013 1:00:00 AM

Valid to:
8/24/2014 12:59:59 AM

Subject:
CN="Secure Labs Payments, S.L.", OU=Digital ID Class 3 - Microsoft Software Validation v2, O="Secure Labs Payments, S.L.", L=Castellon, S=Castellon, C=ES

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
6DFFBC0518D87B00096D2F699C43EF4C

File PE Metadata
Compilation timestamp:
5/8/2010 3:56:35 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.56

CTPH (ssdeep):
3072:5jOyzigdxdIfIuw6RYnj3WCW2EW5x457y3+qRB72f9WLQIo65vorUEaGeZSavoIj:5jdYIuwP0dqL2VcY2FEaDpvoz9A/PrV

Entry address:
0x4044

Entry point:
55, 89, E5, 57, 56, 53, 81, EC, AC, 01, 00, 00, E8, 17, 57, 00, 00, C7, 04, 24, 01, 80, 00, 00, E8, 7B, 50, 00, 00, 56, C7, 04, 24, 00, 00, 00, 00, E8, 4E, 57, 00, 00, A3, 50, 5B, 42, 00, 53, C7, 04, 24, 08, 00, 00, 00, E8, 26, 32, 00, 00, A3, 00, 5C, 42, 00, 8D, 85, 84, FE, FF, FF, 51, C7, 44, 24, 10, 00, 00, 00, 00, C7, 44, 24, 0C, 60, 01, 00, 00, 89, 44, 24, 08, C7, 44, 24, 04, 00, 00, 00, 00, C7, 04, 24, A4, B2, 40, 00, E8, E8, 55, 00, 00, 83, EC, 14, C7, 44, 24, 04, A5, B2, 40, 00, C7, 04, 24, 30, 5C...
 
[+]

Code size:
34.5 KB (35,328 bytes)

The file google_adwords_editor_10.1_setup.exe has been seen being distributed by the following URL.

Remove google_adwords_editor_10.1_setup.exe - Powered by Reason Core Security