91f4895b-5e2a-42e4-b330-e2e713d86f4c.exe

Torpedo

King Gainer Lab

This adware is a web browser extension that will inject advertising in the browser in the form of unwanted banners and text-links which may link to malware sites and install unwanted software. The application 91f4895b-5e2a-42e4-b330-e2e713d86f4c.exe by King Gainer Lab has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. It is distributed as part of the Brightcircle group of browser-extensions.
Publisher:
King Gainer Lab  (signed and verified)

Product:
Torpedo

Version:
1.0.0.0

MD5:
4232941bdbce3b4bc88587068a318a7a

SHA-1:
8debeade6ca71d7c14835253ee28ba6adc9464c0

SHA-256:
3228c3518ffc2da9ff3858198765b3450b4f44b8b47b5af316861ce62ba915eb

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
4/25/2024 4:12:41 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Brightcicrle (M)
17.1.30.10

File size:
31.9 KB (32,664 bytes)

Product version:
1.0.0.0

Copyright:
Copyright © 2014

Original file name:
TorpedoChNet4.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\Program Files\thetorntv v10\91f4895b-5e2a-42e4-b330-e2e713d86f4c.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
8/19/2014 2:00:00 AM

Valid to:
8/20/2015 1:59:59 AM

Subject:
CN=King Gainer Lab, O=King Gainer Lab, STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Nicosia, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
10B5049C2559348D7A87203A148C790A

File PE Metadata
Compilation timestamp:
8/18/2014 2:06:32 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

Entry address:
0x82AE

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
5.4354

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
25 KB (25,600 bytes)

Scheduled Task
Task name:
91f4895b-5e2a-42e4-b330-e2e713d86f4c

Trigger:
Logon (Runs on logon)


Remove 91f4895b-5e2a-42e4-b330-e2e713d86f4c.exe - Powered by Reason Core Security