0tdvxrhtz.exe

Peter Sulik

The is the installer for the WebPick InstalleRex download manager which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed without consent. The application 0tdvxrhtz.exe by Peter Sulik has been detected as adware by 27 anti-malware scanners. It is built using the Crossrider cross-browser extension platform. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider. It is also typically executed from an Internet Explorer cache folder.
Publisher:
Peter Sulik  (signed and verified)

MD5:
ff39a96074319d39caccd3a44c84090e

SHA-1:
e20e00c97fa3fe1aeb23d33846f4c4a1b84e181b

SHA-256:
67c851e7aad68450f37554466b1dd7c3469bcd27205317841878b67b769444e0

Scanner detections:
27 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Analysis date:
4/26/2024 10:12:27 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Dropper.101
941

Agnitum Outpost
Trojan.Adware
7.1.1

AhnLab V3 Security
Adware/Win32.Graftor
2014.07.05

Avira AntiVirus
ADWARE/Adware.Gen7
7.11.158.148

avast!
Win32:InstallMonstr-DD [PUP]
2014.9-140708

AVG
Generic
2015.0.3419

Bitdefender
Gen:Variant.Adware.Dropper.101
1.0.20.945

Clam AntiVirus
Win.Adware.Agent-6849
0.98/21411

Comodo Security
Application.Win32.MegaSearch.ATH
18771

Dr.Web
Trojan.Crossrider.21
9.0.1.0189

Emsisoft Anti-Malware
Gen:Variant.Adware.Dropper.101
8.14.07.08.02

ESET NOD32
Win32/Preloader (variant)
8.10048

F-Prot
W32/A-02a66f1f
v6.4.7.1.166

F-Secure
Gen:Variant.Adware.Dropper.101
11.2014-08-07_3

G Data
Gen:Variant.Adware.Dropper.101
14.7.24

IKARUS anti.virus
Win32.SuspectCrc
t3scan.1.6.1.0

McAfee
PUP-FEI
5600.7075

MicroWorld eScan
Gen:Variant.Adware.Dropper.101
15.0.0.567

NANO AntiVirus
Trojan.Win32.Generic.cqkjro
0.28.0.60577

Norman
Kryptik.CCRN
11.20140708

Panda Antivirus
Trj/Genetic.gen
14.07.08.02

Qihoo 360 Security
HEUR/Malware.QVM10.Gen
1.0.0.1015

Reason Heuristics
PUP.PeterSulik.J
14.7.8.14

Rising Antivirus
PE:PUF.Graftor!1.9C49
23.00.65.14706

Trend Micro House Call
TROJ_GEN.R08NB01G314
7.2.189

Vba32 AntiVirus
AdWare.MegaSearch
3.12.26.3

VIPRE Antivirus
Trojan.Win32.Generic
30978

File size:
708.3 KB (725,328 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\microsoft\windows\temporary internet files\content.ie5\{random}\0tdvxrhtz.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
11/26/2013 7:00:00 PM

Valid to:
11/27/2014 6:59:59 PM

Subject:
CN=Peter Sulik, O=Peter Sulik, STREET=Izyumskaya 11, L=Kiev, S=Kiev, PostalCode=03039, C=UA

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
51664A6CB00BE789CB474E7F25A72C4D

File PE Metadata
Compilation timestamp:
9/29/2013 9:08:09 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
12288:6PReoqB9U7eiiWmMMLjodsfGEchyw7C7WBpMAUAY1MCFuvKmPpFYppoEdDy/n08t:6PBqcaMSws27TMA6KCkfjxEJa08cxWZp

Entry address:
0x14438

Entry point:
E8, 04, 41, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 48, 8F, 42, 00, E8, B2, 06, 00, 00, E8, D1, 42, 00, 00, 0F, B7, F0, 6A, 02, E8, 97, 40, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, E8, 0C, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Entropy:
7.7185  (probably packed)

Code size:
133.5 KB (136,704 bytes)

Remove 0tdvxrhtz.exe - Powered by Reason Core Security