kuyhaa-android19comd.exe

Bigasesadu

AVSoftware Ltd

The application kuyhaa-android19comd.exe, “Bigasesadu Setup ” by AVSoftware has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Inno Setup installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. The file has been seen being downloaded from www.capitaltowervault.com.
Publisher:
AVSoftware Ltd  (signed and verified)

Product:
Bigasesadu

Description:
Bigasesadu Setup

Version:
3.8.5.1

MD5:
9de43eaf01869da738e1d483af1d16da

SHA-1:
021465aee660d2b33b3c99ec3178bef269a1e5be

SHA-256:
1ffbdc3140ba0342ae266380049df1587419bda4086522b3f5b077dee7467dcd

Scanner detections:
1 / 68

Status:
Potentially unwanted

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Analysis date:
11/30/2024 3:44:38 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.InstallCore.AVSoftwa.Installer (M)
16.4.23.20

File size:
964.9 KB (988,032 bytes)

Product version:
5.4.2

Copyright:
Web Software internet

File type:
Executable application (Win32 EXE)

Installer:
Inno Setup

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\microsoft\windows\inetcache\ie\{random}\kuyhaa-android19comd.exe

Digital Signature
Signed by:

Authority:
GlobalSign nv-sa

Valid from:
12/31/2015 9:55:52 PM

Valid to:
12/31/2016 9:55:52 PM

Subject:
CN=AVSoftware Ltd, O=AVSoftware Ltd, L=Sofia, C=BG

Issuer:
CN=GlobalSign CodeSigning CA - SHA256 - G2, O=GlobalSign nv-sa, C=BE

Serial number:
112134814B6C56AF7047C195AE1D737EC185

File PE Metadata
Compilation timestamp:
6/20/1992 5:22:17 AM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
24576:il8mbRZRz5W3NXkdnObt8B9EiWPCv1BZg+FOwSGkPMD6+bpYoq:iSo/rqXtt8fWq1BZ/KM1NY

Entry address:
0xA5F8

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, CE, 8A, FF, FF, E8, D5, 9C, FF, FF, E8, 64, 9F, FF, FF, E8, 07, A0, FF, FF, E8, A6, BF, FF, FF, E8, 11, E9, FF, FF, E8, 78, EA, FF, FF, 33, C0, 55, 68, C9, AC, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, 92, AC, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 26, F5, FF, FF, E8, 11, F1, FF, FF, 80, 3D, 34, B2, 40, 00, 00, 74, 0C, E8, 23, F6, FF, FF, 33, C0, E8, C4, 97, FF, FF, 8D, 55, F0, 33, C0, E8, B6, C5, FF, FF, 8B, 55...
 
[+]

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
39.5 KB (40,448 bytes)

The file kuyhaa-android19comd.exe has been seen being distributed by the following URL.

Remove kuyhaa-android19comd.exe - Powered by Reason Core Security