CLIStart.exe

Catalyst Control Center

Advanced Micro Devices, Inc.

The executable CLIStart.exe, “Catalyst® Control Center Launcher” has been detected as malware by 14 anti-virus scanners. It is set to automatically execute when any user logs into Windows (through the local user run registry setting) with the name ‘StartCCC’. Infected by an entry-point obscuring polymorphic file infector which will create a peer-to-peer botnet and receives URLs of additional files to download.
Publisher:
Advanced Micro Devices, Inc.

Product:
Catalyst® Control Center

Description:
Catalyst® Control Center Launcher

Version:
3.5.0.0

MD5:
c2b3a265e6967eb54814c77b17f1a7a0

SHA-1:
45fa473d41386ffb80f1c85bfdc8f9bec23e229f

SHA-256:
20e78d751fd277dc495ee4b6f1891814623b19009abb33c44416a15913520687

Scanner detections:
14 / 68

Status:
File is infected by a Virus

Explanation:
The file is infected by a polymorphic file infector virus.

Analysis date:
4/25/2024 1:48:36 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Win32.Sality.3
5691347

avast!
Win32:Kukacka
160118-1

AVG
Win32/Sality
2015.0.4489

Boost by Reason
Optional.AdvancedMicroDevices.Startup
188838

Dr.Web
Win32.Sector.30
9.0.1.05190

Emsisoft Anti-Malware
Win32.Sality
10.0.0.5366

ESET NOD32
Win32/Sality.NBA virus
7.0.302.0

F-Prot
W32/Sality.gen2
4.6.5.141

F-Secure
Win32.Sality.3
5.15.21

Kaspersky
Virus.Win32.Sality
15.0.0.562

McAfee
Virus.W32/Sality.gen.z
18.0.204.0

Norman
Win32.Sality.3
11.01.2016 17:30:26

Sophos
Virus 'Mal/Sality-D'
5.22

VIPRE Antivirus
Threat.4721115
46908

File size:
806.7 KB (826,080 bytes)

Product version:
3.5.0.0

Copyright:
© 2008 Advanced Micro Devices, Inc.

Original file name:
CLIStart.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\ati technologies\ati.ace\core-static\x86\clistart.exe

File PE Metadata
Compilation timestamp:
4/18/2014 9:17:18 AM

OS version:
6.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
6144:GRsLKrT2+0BUu6Ak4JAP/UZCtYEAOKAOHcJ0QFhmxTB7drI/7gkzKTr6gQu10geu:WsLKrTAzbJ8ftYEQiKv6gQuigeF4

Entry address:
0x2B3F4

Entry point:
60, C7, C1, 1A, E0, C4, 87, 68, 57, 1E, D1, 00, 53, 38, F3, 11, CD, 8A, F8, 0F, AF, CF, 81, EE, 92, A8, 5E, C3, F6, C1, 54, 03, E9, 8D, 1D, B5, A3, 6E, C6, F7, C6, E2, D7, 80, CE, 8D, 0B, 0F, AF, FE, 0F, AF, E8, 85, EB, B2, F5, 33, C1, 89, DE, C6, C7, 9D, 8A, DD, 4E, F6, C5, C1, 48, E8, 00, 00, 00, 00, 5D, 8A, ED, 8D, 3D, 9F, 9B, E3, 56, 4E, B9, F2, ED, 7F, 9D, FF, C2, 81, F6, 7F, 74, CD, A9, FE, CF, BA, 1A, DA, 6C, 1C, B5, 46, FE, CF, C7, C2, 5B, D9, 75, F5, 85, C3, 84, FA, 89, F8, 85, CB, B4, 27, 46, F2...
 
[+]

Entropy:
5.8161

Code size:
296 KB (303,104 bytes)

Startup File (All Users Run)
Registry location:
HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
StartCCC

Command:
"C:\Program Files\ati technologies\ati.ace\core-static\x86\clistart.exe" msrun


Remove CLIStart.exe - Powered by Reason Core Security