hqghumeaylnlf.exe

Optimizer Pro v3.2

PC Utilities Software Limited

Part of the Optimizer Pro / Driver 'PC optimizer' product lines marketed by Adsology and distributed through various bundled software (PPI and commission) channels. The application hqghumeaylnlf.exe, “OptimizerPro – Clean up your PC” by PC Utilities Software Limited has been detected as a potentially unwanted program by 34 anti-malware scanners. This is a setup program which is used to install the application. It runs as a scheduled task under the Windows Task Scheduler triggered daily at a specified time.
Publisher:
PC Utilities Software Limited  (signed and verified)

Product:
Optimizer Pro v3.2

Description:
OptimizerPro – Clean up your PC

Version:
3.2.0.3

MD5:
66a6e00886d3831572bce9e463c65773

SHA-1:
6c81f6fcc6f14f1fcd0bd5451026fe5edc15c05a

SHA-256:
94ad2640dcf0af99d42c023429123a262e2c0ee95a724dbdcdcc978d7b94369e

Scanner detections:
34 / 68

Status:
Potentially unwanted

Explanation:
Installed with the Optimizer Pro software which is bundled by 3rd-party monetization programs.

Analysis date:
1/24/2025 10:38:41 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Generic.1409520
572

Agnitum Outpost
Riskware.SpeedingUpMyPC
7.1.1

Avira AntiVirus
ADWARE/Downware.636040
8.3.1.6

Arcabit
Application.Generic.D1581F0
1.0.0.425

avast!
Win32:GenMaliciousA-III [PUP]
2014.9-150712

AVG
Generic
2016.0.3050

Baidu Antivirus
PUA.Win32.Rezimitpo
4.0.3.15712

Bitdefender
Application.Generic.1409520
1.0.20.965

Bkav FE
W32.HfsAdware
1.3.0.6979

Clam AntiVirus
Win.Trojan.Optimizerpro-41
0.98/20554

Comodo Security
Application.Win32.OptimizerPro.FY
22717

Dr.Web
Program.Unwanted.530
9.0.1.0193

Emsisoft Anti-Malware
Gen:Variant.Strictor.88412
8.15.07.12.04

ESET NOD32
Win32/Adware.SpeedingUpMyPC (variant)
9.11917

Fortinet FortiGate
Riskware/OptimizerPro
7/12/2015

F-Secure
Application.Generic.1409520
11.2015-12-07_1

G Data
Application.Generic.1409520
15.7.25

IKARUS anti.virus
PUA.SpeedingUpMyPC
t3scan.1.9.5.0

K7 AntiVirus
Adware
13.205.16517

Kaspersky
not-a-virus:RiskTool.Win32.OptimizerPro
14.0.0.1746

Malwarebytes
PUP.Optional.PCOptimizerPro
v2015.07.12.04

McAfee
Artemis!66A6E00886D3
5600.6706

MicroWorld eScan
Application.Generic.1409520
16.0.0.579

NANO AntiVirus
Trojan.Win32.FakeAV.dsjhrr
0.30.24.2487

Norman
Gen:Variant.Strictor.88412
11.20150712

Panda Antivirus
Trj/Genetic.gen
15.07.12.04

Qihoo 360 Security
Win32/Virus.IM.067
1.0.0.1015

Quick Heal
PUA.Pcutilitie.Gen
7.15.14.00

Reason Heuristics
PUP.PC Utilities.PCUtilities (M)
15.7.12.16

Sophos
Mal/Generic-S
4.98

Trend Micro House Call
TROJ_GEN.R08NC0EF515
7.2.193

Trend Micro
TROJ_GEN.R08NC0EF515
10.465.12

VIPRE Antivirus
OptimizerPro
41870

Zillya! Antivirus
Adware.SpeedingUpMyPC.Win32.136
2.0.0.2277

File size:
6.1 MB (6,375,112 bytes)

Product version:
3.2.0.3

Copyright:
PC Utilities Software Limited

Original file name:
Optimizer Pro

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\ProgramData\{99baa43a-09e4-ce5f-99ba-aa43a09e90e8}\hqghumeaylnlf.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
8/26/2014 7:00:00 PM

Valid to:
8/27/2015 6:59:59 PM

Subject:
CN=PC Utilities Software Limited, OU=PC Utlities Software Limited, O=PC Utilities Software Limited, STREET=78 York Street, STREET=England W1H 1DP, STREET=London, L=London, S=England W1H 1DP, PostalCode=W1H 1DP, C=GB

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
0093DD8B6FAE943D113CA18A5DAC967D96

File PE Metadata
Compilation timestamp:
7/3/2015 4:10:26 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
196608:CKenyy2kAIhkBsnE0/89a8olEH+NWJ5tIl:CKOyy2khkBsESlEHOW/Cl

Entry address:
0x14C87

Entry point:
E8, 86, 7D, 00, 00, E9, 89, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 8B, 4C, 24, 04, F7, C1, 03, 00, 00, 00, 74, 24, 8A, 01, 83, C1, 01, 84, C0, 74, 4E, F7, C1, 03, 00, 00, 00, 75, EF, 05, 00, 00, 00, 00, 8D, A4, 24, 00, 00, 00, 00, 8D, A4, 24, 00, 00, 00, 00, 8B, 01, BA, FF, FE, FE, 7E, 03, D0, 83, F0, FF, 33, C2, 83, C1, 04, A9, 00, 01, 01, 81, 74, E8, 8B, 41, FC, 84, C0, 74, 32, 84, E4, 74, 24, A9, 00, 00, FF, 00, 74, 13, A9, 00, 00, 00, FF, 74, 02, EB, CD, 8D, 41, FF, 8B...
 
[+]

Entropy:
7.9757  (probably packed)

Code size:
150.5 KB (154,112 bytes)

Scheduled Task
Task name:
Bidaily Synchronize Task[8da6]

Trigger:
Daily (Runs daily at 3:57 PM)


The file hqghumeaylnlf.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to ec2-54-72-9-115.eu-west-1.compute.amazonaws.com  (54.72.9.115:80)

Remove hqghumeaylnlf.exe - Powered by Reason Core Security