hqghumeaylnlf.exe

Optimizer Pro v3.2

PC Utilities Software Limited

Part of the Optimizer Pro / Driver 'PC optimizer' product lines marketed by Adsology and distributed through various bundled software (PPI and commission) channels. The application hqghumeaylnlf.exe, “OptimizerPro – Clean up your PC” by PC Utilities Software Limited has been detected as a potentially unwanted program by 53 anti-malware scanners. This is a setup program which is used to install the application. The file has been seen being downloaded from cdn.chironexfleckerisilver.com.
Publisher:
PC Utilities Software Limited  (signed and verified)

Product:
Optimizer Pro v3.2

Description:
OptimizerPro – Clean up your PC

Version:
3.2.0.3

MD5:
05a26fbc44a2decca26e29f6a355daf7

SHA-1:
67619c970f61c918100f81487213bd8b9375159d

SHA-256:
8bdc01e5e9817bec51ef26b673c1c42edcb505015236d692acc7b00e5f219da7

Scanner detections:
53 / 68

Status:
Potentially unwanted

Explanation:
Installed with the Optimizer Pro software which is bundled by 3rd-party monetization programs.

Analysis date:
11/5/2024 4:43:03 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Mikey.11354
651

Agnitum Outpost
Riskware.SpeedingUpMyPC
7.1.1

AhnLab V3 Security
PUP/Win32.OptimizerPro
2015.04.16

avast!
Win32:OptimizerPro-G [PUP]
2014.9-150424

AVG
Win.Threat.High
2016.0.3129

Baidu Antivirus
PUA.Win32.SpeedingUpMyPC
4.0.3.15424

Bitdefender
Gen:Variant.Mikey.11354
1.0.20.570

Bkav FE
W32.HfsAdware
1.3.0.6379

Comodo Security
Application.Win32.OptimizerPro.FY
21613

Dr.Web
riskware program Program.Unwanted.295
9.0.1.05190

Emsisoft Anti-Malware
Gen:Variant.Adware.Mikey.11354
8.15.04.24.03

ESET NOD32
Win32/Adware.SpeedingUpMyPC.AA application
7.0.302.0

Fortinet FortiGate
Riskware/SpeedingUpMyPC
4/24/2015

F-Secure
Gen:Variant.Adware.Mikey
11.2015-24-04_6

G Data
Win32.Application.OptimizerPro
15.4.25

herdProtect (fuzzy)
2015.7.25.18

IKARUS anti.virus
PUA.SpeedingUpMyPC
t3scan.1.8.9.0

K7 AntiVirus
Adware
13.203.15842

Kaspersky
UDS:DangerousObject.Multi.Generic
14.0.0.2142

Malwarebytes
PUP.Optional.OptimizerPro
v2015.04.24.03

McAfee
Artemis!62E99939CE53
5600.6785

MicroWorld eScan
Application.Generic.1266608
16.0.0.342

NANO AntiVirus
Riskware.Win32.Unwanted.dqmtwu
0.30.24.1357

Panda Antivirus
PUP/OptimizerPro
15.04.24.03

Qihoo 360 Security
HEUR/QVM41.1.Malware.Gen
1.0.0.1015

Quick Heal
PUA.Pcutilitie.Gen
4.15.14.00

Reason Heuristics
PUP.PC Utilities.PCUtilities
15.4.24.11

Sophos
Generic PUA AO
4.98

Trend Micro House Call
Suspicious_GEN.F47V0405
7.2.114

Trend Micro
TROJ_GEN.R08NC0OD515
10.465.24

VIPRE Antivirus
OptimizerPro
38964

Zillya! Antivirus
Trojan.ArchSMS.Win32.29014
2.0.0.2172

File size:
5.7 MB (5,986,912 bytes)

Product version:
3.2.0.3

Copyright:
PC Utilities Software Limited

Original file name:
Optimizer Pro

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\ProgramData\{4ddb108b-c8c1-f0b8-4ddb-b108bc8c422f}\hqghumeaylnlf.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
11/20/2014 7:00:00 PM

Valid to:
11/21/2015 6:59:59 PM

Subject:
CN=PC Utilities Software Limited, O=PC Utilities Software Limited, STREET=78 York Street, L=London, PostalCode=W1H 1DP, C=GB

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00F10854548D47F74C920D7091D9057D6E

File PE Metadata
Compilation timestamp:
4/20/2015 10:18:46 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
98304:clipjoszzVF3wMsNZRxxb5AxGy32TuiCm8Kf4tnm6UEwbWVnjKxX:e8oszzVZsNLNAxN3uu+B6UE2cOxX

Entry address:
0x143B6

Entry point:
E8, 87, 7D, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, EC, 20, 8B, 45, 08, 56, 57, 6A, 08, 59, BE, 30, 65, 42, 00, 8D, 7D, E0, F3, A5, 89, 45, F8, 8B, 45, 0C, 5F, 89, 45, FC, 5E, 85, C0, 74, 0C, F6, 00, 08, 74, 07, C7, 45, F4, 00, 40, 99, 01, 8D, 45, F4, 50, FF, 75, F0, FF, 75, E4, FF, 75, E0, FF, 15, 20, 61, 42, 00, C9, C2, 08, 00, CC, CC, CC, CC, 8B, 4C, 24, 04, F7, C1, 03, 00, 00, 00, 74, 24, 8A, 01, 83, C1, 01, 84, C0, 74, 4E, F7, C1, 03, 00, 00, 00, 75, EF, 05, 00, 00, 00, 00, 8D, A4, 24, 00...
 
[+]

Entropy:
7.9737  (probably packed)

Code size:
148 KB (151,552 bytes)

User Start Menu Item
Name:
hqghumeaylnlf.exe


The file hqghumeaylnlf.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to ec2-54-72-9-51.eu-west-1.compute.amazonaws.com  (54.72.9.51:80)

Remove hqghumeaylnlf.exe - Powered by Reason Core Security