ikfhcuwnmkanlg.exe

App Lid

Lid

The application ikfhcuwnmkanlg.exe, “App Lid Installer” has been detected as adware by 21 anti-malware scanners. The program is a setup application that uses the Nullsoft Install System installer, however the file is not signed with an authenticode signature from a trusted source. It is built using the Crossrider cross-browser extension platform. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider. It is also typically executed from the user's temporary directory.
Publisher:
Lid

Product:
App Lid

Description:
App Lid Installer

Version:
1.36.01.22

MD5:
b56b9f1ae198fc073c9fb26db0946f18

SHA-1:
c0584a302831ef30a2f7ca9790725e74040c5655

SHA-256:
71029e1d67cf5fcefc856214af5d5d996c9d82960c54f6219916d3dacdc4f387

Scanner detections:
21 / 68

Status:
Adware

Explanation:
This is part of the Crossrider Internet browser extension framework which may modify the user's web browser settings including changing the home and search pages.

Note:
Crossrider is the owner of a platform that enables the creation of cross-browser extensions by developers but is not the owner of this detected application.

Analysis date:
11/28/2024 12:05:11 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.JS.Crossrider.B
5627563

AhnLab V3 Security
PUP/Win32.CrossRider
2015.06.02

Avira AntiVirus
ADWARE/CrossRider.Gen7
8.3.1.6

avast!
Crossrider-EV [PUP]
150531-1

AVG
Potentially harmful program Crossrider.PXL
2014.0.4311

Dr.Web
infected with Trojan.Crossrider.46916
9.0.1.05190

ESET NOD32
Win32/Toolbar.CrossRider.CM potentially unwanted application
7.0.302.0

Fortinet FortiGate
Riskware/CrossRider
6/2/2015

G Data
Script.Application.Plush
15.6.25

Kaspersky
not-a-virus:WebToolbar.JS.CroRi
15.0.0.543

Malwarebytes
PUP.Optional.AppLid.A
v2015.06.02.09

McAfee
Trojan.Artemis!693EB413162C
18.0.204.0

MicroWorld eScan
Adware.JS.Crossrider.B
16.0.0.459

Panda Antivirus
Trj/Genetic.gen
15.06.02.09

Qihoo 360 Security
HEUR/QVM30.1.Malware.Gen
1.0.0.1015

Reason Heuristics
PUP.Downloader.Installer
15.6.1.14

Rising Antivirus
PE:Malware.Adwapper!6.2201
23.00.65.15531

Trend Micro House Call
Suspici.B4B5A775
7.2.153

Trend Micro
ADW_CROSSRIDER
10.465.02

Vba32 AntiVirus
suspected of Trojan.Downloader.gen.h
3.12.26.4

Zillya! Antivirus
Trojan.BlackGen.Win32.11
2.0.0.2201

File size:
11.1 MB (11,657,683 bytes)

Copyright:
Copyright Lid

File type:
Executable application (Win32 EXE)

Installer:
Nullsoft Install System

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\ikfhcuwnmkanlg.exe

File PE Metadata
Compilation timestamp:
12/4/2012 8:55:02 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.22

CTPH (ssdeep):
196608:id2OfCb1GL7XS7iu7vZ3CSTdE4/mYHxiQKxbAVT20eO48uhZyB:zeChfiu13CiE4+YHLSAOvQ

Entry address:
0x4323

Entry point:
55, 89, E5, 57, 56, 53, 81, EC, AC, 01, 00, 00, FF, 15, 74, C3, 44, 00, C7, 04, 24, 01, 80, 00, 00, FF, 15, 58, C4, 44, 00, 53, C7, 04, 24, 00, 00, 00, 00, FF, 15, 98, C4, 44, 00, 56, A3, 40, 3B, 44, 00, C7, 04, 24, 08, 00, 00, 00, E8, 8D, 3B, 00, 00, A3, 9C, 3B, 44, 00, 8D, 85, 84, FE, FF, FF, 57, C7, 44, 24, 10, 00, 00, 00, 00, C7, 44, 24, 0C, 60, 01, 00, 00, 89, 44, 24, 08, C7, 44, 24, 04, 00, 00, 00, 00, C7, 04, 24, 01, B3, 40, 00, FF, 15, AC, C4, 44, 00, 83, EC, 14, C7, 44, 24, 04, 02, B3, 40, 00, C7...
 
[+]

Entropy:
7.9989  (probably packed)

Code size:
34.5 KB (35,328 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to tlb.hwcdn.net  (69.16.175.10:80)

TCP (HTTP):
Connects to s3-website-us-east-1.amazonaws.com  (54.231.0.244:80)

TCP (HTTP):
Connects to ec2-54-83-200-118.compute-1.amazonaws.com  (54.83.200.118:80)

TCP (HTTP):
Connects to ec2-107-21-92-176.compute-1.amazonaws.com  (107.21.92.176:80)

Remove ikfhcuwnmkanlg.exe - Powered by Reason Core Security