e64e9513973958ec395762b933c0e2df290ac3f6fc844a0f8d4ed06e99cedfdb

IMVU

ClientConnect LTD

The file belongs to the ClientConnect (Conduit/Perion) platform, a utility that bundles and monetizes search toolbars and browser add-ons. The file e64e9513973958ec395762b933c0e2df290ac3f6fc844a0f8d4ed06e99cedfdb, “IMVU Setup ” by ClientConnect has been detected as adware by 10 anti-malware scanners. The file has been seen being downloaded from dde.s.ddirectdownload-about.com. While running, it connects to the Internet address cms.dmccint.com on port 80 using the HTTP protocol.
Publisher:
ClientConnect LTD  (signed and verified)

Product:
IMVU

Description:
IMVU Setup

Version:
1.7.0.0.1

MD5:
110918eb4fd8dcac1785fe426057d4e3

SHA-1:
cc5dc9cf5ace5410def0efe23e0b88650a43b798

SHA-256:
e64e9513973958ec395762b933c0e2df290ac3f6fc844a0f8d4ed06e99cedfdb

Scanner detections:
10 / 68

Status:
Adware

Explanation:
Bundles the Conduit Toolbar and/or Conduit Search Protect.

Analysis date:
5/1/2024 4:38:57 AM UTC  (today)

Scan engine
Detection
Engine version

Baidu Antivirus
PUA.Win32.ClientConnect
4.0.3.1563

Bkav FE
W32.HfsAdware
1.3.0.6379

Dr.Web
Adware.Conduit.179
9.0.1.0154

ESET NOD32
Win32/ClientConnect.A potentially unwanted (variant)
9.11697

Fortinet FortiGate
Riskware/ClientConnect
6/3/2015

IKARUS anti.virus
PUA.ClientConnect
t3scan.1.9.2.0

Quick Heal
PUA.Clientconn.Gen
6.15.14.00

Reason Heuristics
PUP.Conduit.Installer
15.6.3.23

Trend Micro House Call
Suspicious_GEN.F47V0313
7.2.154

VIPRE Antivirus
Conduit
40616

File size:
778.8 KB (797,496 bytes)

Product version:
1.7.0.0.1

Language:
Language Neutral

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
2/4/2014 1:00:00 AM

Valid to:
2/6/2016 12:59:59 AM

Subject:
CN=ClientConnect LTD, OU=Digital ID Class 3 - Microsoft Software Validation v2, OU=Prod2, O=ClientConnect LTD, L=Ness Ziona, S=Israel, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
7D43A9D40B810B6AC20F2CDF15B5CCF6

File PE Metadata
Compilation timestamp:
7/9/2014 9:58:13 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
24576:rxGfQ8UlOOPBmNolCm56GHUoaIo3V4SqJwsph+FI:Eo8hOPJom56locKSqJDmi

Entry address:
0x113BC

Entry point:
55, 8B, EC, 83, C4, A4, 53, 56, 57, 33, C0, 89, 45, C4, 89, 45, C0, 89, 45, A4, 89, 45, D0, 89, 45, C8, 89, 45, CC, 89, 45, D4, 89, 45, D8, 89, 45, EC, B8, 2C, 00, 41, 00, E8, E8, 51, FF, FF, 33, C0, 55, 68, 9E, 1A, 41, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, 5A, 1A, 41, 00, 64, FF, 32, 64, 89, 22, A1, 48, 5B, 41, 00, E8, 16, D8, FF, FF, E8, 65, D3, FF, FF, 80, 3D, DC, 2A, 41, 00, 00, 74, 0C, E8, 2B, D9, FF, FF, 33, C0, E8, 80, 32, FF, FF, 8D, 55, EC, 33, C0, E8, E2, A3, FF, FF, 8B, 55, EC, B8, 50, 86...
 
[+]

Entropy:
7.8529

Developed / compiled with:
Microsoft Visual C++

Code size:
63.5 KB (65,024 bytes)

The file e64e9513973958ec395762b933c0e2df290ac3f6fc844a0f8d4ed06e99cedfdb has been seen being distributed by the following URL.

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to cms.dmccint.com  (23.67.242.80:80)

 
http://cms.dmccint.com/DynamicOffer/22512670/22533793/?mainofferId=22509236&CurrentStep=2&TotalSteps=4&DownloadBrowser=IE&CType=-1&UserMode=-1&DMVersion=1.3.2.25.22532659.01&Language=US-EN