hqghumeaylnlf.exe

Optimizer Pro v3.2

PC Utilities Software Limited

Part of the Optimizer Pro / Driver 'PC optimizer' product lines marketed by Adsology and distributed through various bundled software (PPI and commission) channels. The application hqghumeaylnlf.exe, “OptimizerPro – Clean up your PC” by PC Utilities Software Limited has been detected as a potentially unwanted program by 34 anti-malware scanners. This is a setup program which is used to install the application. The file has been seen being downloaded from cdn2.chironexfleckerisilver.com and multiple other hosts.
Publisher:
PC Utilities Software Limited  (signed and verified)

Product:
Optimizer Pro v3.2

Description:
OptimizerPro – Clean up your PC

Version:
3.2.0.3

MD5:
c162b81b419d2ba726db95eabbe8105a

SHA-1:
09f039b6b7ffca9a6c6832c1c735699e9e72c4cd

SHA-256:
a1e0420043935d6a422499ea0c9dbfdd49335da11008d1cfa4afece694a07a18

Scanner detections:
34 / 68

Status:
Potentially unwanted

Explanation:
Installed with the Optimizer Pro software which is bundled by 3rd-party monetization programs.

Analysis date:
11/26/2024 5:35:19 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Mikey.11354
654

Agnitum Outpost
Riskware.Hoax
7.1.1

AhnLab V3 Security
PUP/Win32.OptimizerPro
2015.04.20

avast!
OptimizerPro-G [PUP]
2014.9-150722

AVG
Generic
2016.0.3132

Baidu Antivirus
PUA.Win32.SpeedingUpMyPC
4.0.3.15421

Bitdefender
Gen:Variant.Adware.Mikey.11354
1.0.20.555

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Agent-42710
0.98/20551

Comodo Security
Application.Win32.OptimizerPro.FY
21829

Dr.Web
riskware program Program.Unwanted.295
9.0.1.0111

Emsisoft Anti-Malware
Gen:Variant.Adware.Mikey.11354
8.15.04.21.02

ESET NOD32
Win32/Adware.SpeedingUpMyPC.AA application
9.7.0.302.0

Fortinet FortiGate
Riskware/SpeedingUpMyPC
4/21/2015

F-Secure
Gen:Variant.Adware.Mikey
11.2015-21-04_3

G Data
Gen:Variant.Adware.Mikey.11354
15.4.25

IKARUS anti.virus
PUA.SpeedingUpMyPC
t3scan.1.8.9.0

K7 AntiVirus
Adware
13.202.15546

Kaspersky
Trojan-FakeAV.Win32.Agent
14.0.0.2157

Malwarebytes
PUP.Optional.OptimizerPro
v2015.04.21.02

McAfee
Artemis!C162B81B419D
5600.6788

MicroWorld eScan
Gen:Variant.Adware.Mikey.11354
16.0.0.333

NANO AntiVirus
Riskware.Win32.Unwanted.dqmtwu
0.30.16.1110

Norman
Gen:Variant.Adware.Mikey.11354
11.20150722

Panda Antivirus
Trj/Genetic.gen
15.04.21.02

Qihoo 360 Security
HEUR/QVM41.1.Malware.Gen
1.0.0.1015

Quick Heal
PUA.Pcutilitie.Gen
4.15.14.00

Reason Heuristics
PUP.PC Utilities.PCUtilities
15.4.21.10

Sophos
Generic PUA AO
4.98

Trend Micro House Call
Suspicious_GEN.F47V0418
7.2.111

Trend Micro
TROJ_GEN.R08NC0OD515
10.465.21

VIPRE Antivirus
Threat.5068139
40828

Zillya! Antivirus
Trojan.ArchSMS.Win32.28918
2.0.0.2145

File size:
5.7 MB (5,981,792 bytes)

Product version:
3.2.0.3

Copyright:
PC Utilities Software Limited

Original file name:
Optimizer Pro

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\ProgramData\{8048b65c-dd5b-21b5-8048-8b65cdd5d973}\hqghumeaylnlf.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
11/20/2014 6:00:00 PM

Valid to:
11/21/2015 5:59:59 PM

Subject:
CN=PC Utilities Software Limited, O=PC Utilities Software Limited, STREET=78 York Street, L=London, PostalCode=W1H 1DP, C=GB

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00F10854548D47F74C920D7091D9057D6E

File PE Metadata
Compilation timestamp:
4/17/2015 3:19:01 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
98304:GZATtA68QnICmQ3JZ5kbVIYkxH9rZ11pUlPk1EpKztrjiLAXoErWJVlmwp2CrX2t:GOxN8YmQ3J3WeYadrZ11KPlpKzViL1EL

Entry address:
0x13907

Entry point:
E8, 86, 7A, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, EC, 20, 8B, 45, 08, 56, 57, 6A, 08, 59, BE, 00, 65, 42, 00, 8D, 7D, E0, F3, A5, 89, 45, F8, 8B, 45, 0C, 5F, 89, 45, FC, 5E, 85, C0, 74, 0C, F6, 00, 08, 74, 07, C7, 45, F4, 00, 40, 99, 01, 8D, 45, F4, 50, FF, 75, F0, FF, 75, E4, FF, 75, E0, FF, 15, 1C, 61, 42, 00, C9, C2, 08, 00, CC, CC, CC, 8B, 4C, 24, 04, F7, C1, 03, 00, 00, 00, 74, 24, 8A, 01, 83, C1, 01, 84, C0, 74, 4E, F7, C1, 03, 00, 00, 00, 75, EF, 05, 00, 00, 00, 00, 8D, A4, 24, 00, 00...
 
[+]

Entropy:
7.9741  (probably packed)

Code size:
144.5 KB (147,968 bytes)

The file hqghumeaylnlf.exe has been seen being distributed by the following 2 URLs.

Remove hqghumeaylnlf.exe - Powered by Reason Core Security