hqghumeaylnlf.exe

Optimizer Pro v3.2

PC Utilities Software Limited

Part of the Optimizer Pro / Driver 'PC optimizer' product lines marketed by Adsology and distributed through various bundled software (PPI and commission) channels. The application hqghumeaylnlf.exe, “OptimizerPro – Clean up your PC” by PC Utilities Software Limited has been detected as a potentially unwanted program by 34 anti-malware scanners. This is a setup program which is used to install the application. It runs as a scheduled task under the Windows Task Scheduler triggered daily at a specified time.
Publisher:
PC Utilities Software Limited  (signed and verified)

Product:
Optimizer Pro v3.2

Description:
OptimizerPro – Clean up your PC

Version:
3.2.0.3

MD5:
772a3c25e20149a0bc2f1bdce79624ad

SHA-1:
66b2d3406f9cf26ac452db4d553f2c9ce7e64c9b

SHA-256:
001ec795e0bad9dc9ba907da9b591588dfd7cbd5eedc9d3855b68b44486eb8b9

Scanner detections:
34 / 68

Status:
Potentially unwanted

Explanation:
Installed with the Optimizer Pro software which is bundled by 3rd-party monetization programs.

Analysis date:
11/24/2017 11:42:51 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Generic.1283457
622

Agnitum Outpost
Riskware.SpeedingUpMyPC
7.1.1

AhnLab V3 Security
PUP/Win32.OptimizerPro
2015.04.16

avast!
Win32:OptimizerPro-G [PUP]
2014.9-150523

AVG
Generic
2016.0.3100

Baidu Antivirus
PUA.Win32.SpeedingUpMyPC
4.0.3.15523

Bitdefender
Gen:Variant.Mikey.11354
1.0.20.715

Bkav FE
W32.HfsAdware
1.3.0.6379

Comodo Security
Application.Win32.OptimizerPro.FY
22215

Dr.Web
Program.Unwanted.295
9.0.1.0143

Emsisoft Anti-Malware
Gen:Variant.Adware.Mikey.11354
8.15.05.23.02

ESET NOD32
Win32/Adware.SpeedingUpMyPC (variant)
9.11671

Fortinet FortiGate
Riskware/SpeedingUpMyPC
5/23/2015

F-Secure
Gen:Variant.Adware.Mikey
11.2015-23-05_7

G Data
Win32.Application.OptimizerPro
15.5.25

IKARUS anti.virus
PUA.SpeedingUpMyPC
t3scan.1.8.9.0

Jiangmin
Hoax.ArchSMS.axzg
KV150523

K7 AntiVirus
Adware
13.202.15546

K7 Gateway Antivirus
Adware
13.202.15544

Kaspersky
Trojan-FakeAV.Win32.Agent
14.0.0.1997

Malwarebytes
PUP.Optional.PCOptimizerPro
v2015.05.23.02

McAfee
Artemis!772A3C25E201
5600.6756

McAfee Web Gateway
Artemis
7.6756

MicroWorld eScan
Application.Generic.1283457
16.0.0.429

NANO AntiVirus
Riskware.Win32.Unwanted.dqmtwu
0.30.24.1636

Panda Antivirus
PUP/OptimizerPro
15.05.23.02

Qihoo 360 Security
Win32/Trojan.3b0
1.0.0.1015

Quick Heal
PUA.Pcutilitie.Gen
5.15.14.00

Reason Heuristics
PUP.PC Utilities.PCUtilities
15.5.23.14

Sophos
Generic PUA AO
4.98

Trend Micro House Call
Suspicious_GEN.F47V0405
7.2.143

Trend Micro
TROJ_GEN.R08NC0OD515
10.465.23

VIPRE Antivirus
OptimizerPro
40472

Zillya! Antivirus
Trojan.ArchSMS.Win32.28854
2.0.0.2135

File size:
5.7 MB (6,020,704 bytes)

Product version:
3.2.0.3

Copyright:
PC Utilities Software Limited

Original file name:
Optimizer Pro

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\ProgramData\{904ca99e-6b67-c2a8-904c-ca99e6b6a679}\hqghumeaylnlf.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
11/20/2014 4:00:00 PM

Valid to:
11/21/2015 3:59:59 PM

Subject:
CN=PC Utilities Software Limited, O=PC Utilities Software Limited, STREET=78 York Street, L=London, PostalCode=W1H 1DP, C=GB

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00F10854548D47F74C920D7091D9057D6E

File PE Metadata
Compilation timestamp:
5/20/2015 6:45:58 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
98304:HcD0rQaTIyndxFU9rfZzu81ezF/KkghLlHsY7TmvwbsJEv6Ysd54wzu:HgGJb+BtIF/Kj3Ww0d54wzu

Entry address:
0x147D6

Entry point:
E8, F7, 7C, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, EC, 20, 8B, 45, 08, 56, 57, 6A, 08, 59, BE, 50, 75, 42, 00, 8D, 7D, E0, F3, A5, 89, 45, F8, 8B, 45, 0C, 5F, 89, 45, FC, 5E, 85, C0, 74, 0C, F6, 00, 08, 74, 07, C7, 45, F4, 00, 40, 99, 01, 8D, 45, F4, 50, FF, 75, F0, FF, 75, E4, FF, 75, E0, FF, 15, 30, 71, 42, 00, C9, C2, 08, 00, CC, CC, CC, CC, 8B, 4C, 24, 04, F7, C1, 03, 00, 00, 00, 74, 24, 8A, 01, 83, C1, 01, 84, C0, 74, 4E, F7, C1, 03, 00, 00, 00, 75, EF, 05, 00, 00, 00, 00, 8D, A4, 24, 00...
 
[+]

Entropy:
7.9737  (probably packed)

Code size:
149.5 KB (153,088 bytes)

Scheduled Task
Task name:
Periodic Synchronize Task

Trigger:
Daily (Runs daily at 6:04 PM)


The file hqghumeaylnlf.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to ec2-54-72-9-51.eu-west-1.compute.amazonaws.com  (54.72.9.51:80)

Remove hqghumeaylnlf.exe - Powered by Reason Core Security