_6g9r_yvsg.exe

Andrew Kruzov

The is the installer for the WebPick InstalleRex download manager which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed without consent. The application _6g9r_yvsg.exe by Andrew Kruzov has been detected as adware by 26 anti-malware scanners. It is built using the Crossrider cross-browser extension platform. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider. It is also typically executed from an Internet Explorer cache folder.
Publisher:
Andrew Kruzov  (signed and verified)

MD5:
8b5d419c861874010162765f70790c3d

SHA-1:
7019dbc066c203eed2fbf5b38b7217159c71e2de

SHA-256:
fe3515e446fc97e46ae208c7c23a441e7fed8dd1f633a38e7a3c81c57dfd4563

Scanner detections:
26 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Analysis date:
4/25/2024 5:07:18 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Dropper.101
877

Agnitum Outpost
PUA.MultiPlug
7.1.1

Avira AntiVirus
TR/Graftor.141601.A
7.11.171.148

avast!
Win32:PUP-gen [PUP]
140908-2

AVG
Adware Generic_r.JY
2014.0.4015

Bitdefender
Gen:Variant.Adware.Dropper.101
1.0.20.1265

Clam AntiVirus
Win.Adware.Agent-6743
0.98/19348

Comodo Security
Application.Win32.Multiplug.GETF
19471

Dr.Web
Trojan.Crossrider.14455
9.0.1.05190

Emsisoft Anti-Malware
Gen:Variant.Adware.Dropper.101
14.09.10

ESET NOD32
Win32/AdWare.MultiPlug.R application
7.0.302.0

F-Prot
W32/MultiPlug.C.gen
v6.4.7.1.166

F-Secure
Gen:Variant.Adware.Dropper.101
11.2014-10-09_4

G Data
Gen:Variant.Adware.Dropper.101
14.9.24

IKARUS anti.virus
Win32.SuspectCrc
t3scan.1.7.8.0

K7 AntiVirus
Unwanted-Program
13.183.13333

Kaspersky
not-a-virus:HEUR:AdWare.Win32.Agent
14.0.0.3272

Malwarebytes
PUP.Optional.MultiPlug
v2014.09.10.01

McAfee
PUP-FID
5600.7011

MicroWorld eScan
Gen:Variant.Adware.Dropper.101
15.0.0.759

NANO AntiVirus
Riskware.Win32.Agent.cwzhej
0.28.2.61942

Panda Antivirus
Trj/Genetic.gen
14.09.10.01

Reason Heuristics
PUP.AndrewKruzov.K
14.9.10.12

Rising Antivirus
PE:Malware.MultiPlug!6.13CF
23.00.65.14908

Sophos
MultiPlug
4.98

VIPRE Antivirus
Threat.4150696
32938

File size:
696 KB (712,688 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\microsoft\windows\temporary internet files\content.ie5\{random}\_6g9r_yvsg.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
9/26/2013 8:00:00 PM

Valid to:
9/27/2014 7:59:59 PM

Subject:
CN=Andrew Kruzov, O=Andrew Kruzov, STREET=Savrasova 31, L=Kiev, S=Kiev, PostalCode=03110, C=UA

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
53C0E7306A4ED340CBA044D801891A67

File PE Metadata
Compilation timestamp:
4/16/2014 5:41:29 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
12288:ae5wPSaZTj2LnICYdkRkEeqNoekf3i5blzMKGR04rN3/BacTkbZJ4riPO+Z948R2:ae8ZTj2L3YKR9tSiRlIHwpbZG+g8Rn2

Entry address:
0x1098B

Entry point:
E8, CE, 49, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 18, 21, 42, 00, E8, AF, 20, 00, 00, E8, E0, 07, 00, 00, 0F, B7, F0, 6A, 02, E8, 61, 49, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, 20, 37, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Entropy:
7.7559  (probably packed)

Code size:
103 KB (105,472 bytes)

Remove _6g9r_yvsg.exe - Powered by Reason Core Security