prvtzd_dup.exe

The application prvtzd_dup.exe has been detected as a potentially unwanted program by 22 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer, however the file is not signed with an authenticode signature from a trusted source. The file has been seen being downloaded from i1.zoomex.net.
MD5:
4ef4ba836be14eb30f3b034cf74b42e4

SHA-1:
3e3e1a4c7d8d1f9277ee34393891c80ea64c6a2f

SHA-256:
5b76e6c9c52ff4b63b974a957b4b51b32fbff61fe7da657b7f07e353d86439c5

Scanner detections:
22 / 68

Status:
Potentially unwanted

Analysis date:
11/15/2024 5:27:27 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.BGuard.A
351

Agnitum Outpost
Backdoor.Hupigon
7.1.1

Avira AntiVirus
DR/Hupigon.282398
7.11.117.220

avast!
NSIS:SProtector-A [PUP]
2014.9-160218

AVG
BackDoor.Hupigon6
2017.0.2829

Baidu Antivirus
Trojan.Win32.SProtector
4.0.3.16218

Bitdefender
Adware.BGuard.A
1.0.20.245

Comodo Security
UnclassifiedMalware
17383

Dr.Web
Adware.BGuard.11
9.0.1.049

Emsisoft Anti-Malware
Adware.BGuard
8.16.02.18.04

ESET NOD32
Win32/SProtector (variant)
10.9130

Fortinet FortiGate
Adware/Fam.NB
2/18/2016

F-Secure
Adware.BGuard.A
11.2016-18-02_5

G Data
Adware.BGuard
16.2.22

IKARUS anti.virus
AdWare.BGuard
t3scan.2.2.29

K7 AntiVirus
Trojan
13.174.10410

McAfee
Artemis!4EF4BA836BE1
5600.6485

MicroWorld eScan
Adware.BGuard.A
17.0.0.147

Panda Antivirus
Bck/Hupigon.AZG
16.02.18.04

Trend Micro House Call
TROJ_GEN.R0CBB01IK13
7.2.49

Vba32 AntiVirus
Backdoor.Hupigon
3.12.24.3

VIPRE Antivirus
Trojan.Win32.Generic
23996

File size:
1.5 MB (1,590,890 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\appdata\local\microsoft\windows\temporary internet files\content.ie5\{random}\prvtzd_dup.exe

File PE Metadata
Compilation timestamp:
12/5/2009 11:50:52 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
49152:T6EVtj7yLY/FQ2WyJf1R4pwJMA6EVtj7yLY/z:T5iLYW2WgTgwJMA5iLYr

Entry address:
0x30FA

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 18, EC, 42, 00, E8, F1, 2B, 00, 00, A3, 64, EB, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 98, 8F, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 60, E3, 42, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 40, 43, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

The file prvtzd_dup.exe has been seen being distributed by the following URL.

Remove prvtzd_dup.exe - Powered by Reason Core Security