saveas.exe

CHummer

Maxiget Limited

This is a bundle installer which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application saveas.exe, “Description is empty” by Maxiget Limited has been detected as adware by 35 anti-malware scanners. The program is a setup application that uses the New IT Desktop Setup installer. This program installs potentially unwanted software on your PC at the same time as the software you are trying to install, without adequate consent.
Publisher:
Elit -e - Company  (signed by Maxiget Limited)

Product:
CHummer

Description:
Description is empty

Version:
3, 5, 13, 0

MD5:
a3e68c625eb81ab5d39e8c2388fed173

SHA-1:
cb9912604e636674fb62c54e8bb4b6ece19be588

SHA-256:
f8bce31094e7920be4c59e3d39e055df01777cc6a66f83907fcbff85467158c8

Scanner detections:
35 / 68

Status:
Adware

Explanation:
This is a modified installer version of the software and bundles additional offers including adware.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
4/19/2024 11:55:41 PM UTC  (a few moments ago)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Generic.939044
359

Agnitum Outpost
PUA.4Shared
7.1.1

AhnLab V3 Security
PUP/Win32.Downloader
2014.10.20

Avira AntiVirus
APPL/Downloader.Gen8
7.11.171.66

avast!
Win32:FourShared-AL [PUP]
2014.9-160210

AVG
Generic
2017.0.2837

Baidu Antivirus
PUA.Win32.4Shared
4.0.3.16210

Bitdefender
Gen:Variant.Application.Bundler.Jaiks.244
1.0.20.205

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Trojan.4shared-26
0.98/20382

Comodo Security
Application.Win32.4Shared.XEF
19313

Dr.Web
Adware.Downware.1751
9.0.1.041

Emsisoft Anti-Malware
Application.Generic.939044
8.16.02.10.09

ESET NOD32
probably Win32/4Shared.X potentially unwanted application
10.7.0.302.0

F-Prot
W32/A-5663f742
v6.4.7.1.166

F-Secure
Riskware.Application.Generic.939044
11.2016-10-02_4

G Data
Win32.Application.4shared
16.2.24

IKARUS anti.virus
PUA.4Shared
t3scan.1.7.8.0

K7 AntiVirus
Unwanted-Program
13.183.13160

Kaspersky
not-a-virus:Downloader.Win32.AdLoad
14.0.0.680

Malwarebytes
PUP.Optional.Elite
v2016.02.10.09

McAfee
4shared
5600.6493

MicroWorld eScan
Gen:Variant.Application.Bundler.Jaiks.244
17.0.0.123

NANO AntiVirus
Riskware.Win32.Downware.decuce
0.28.2.61861

Norman
Application.Generic.939044
11.20160210

nProtect
Trojan.Generic.11669913
14.09.26.01

Panda Antivirus
Trj/Genetic.gen
16.02.10.09

Reason Heuristics
PUP.New IT Limited.Maxiget.Bundler (M)
16.2.10.21

Sophos
PUA '4Share Downloader'
5.12

SUPERAntiSpyware
Adware.4Shared/Variant
9331

Total Defense
Win32/Tnega.dWJHIMB
37.1.62.1

Trend Micro House Call
TROJ_GEN.R0C1H06D315
7.2.41

Vba32 AntiVirus
suspected of Trojan.Downloader.gen.h
3.12.26.3

VIPRE Antivirus
Threat.4150696
33120

Zillya! Antivirus
Backdoor.PePatch.Win32.43863
2.0.0.1930

File size:
39.6 KB (40,504 bytes)

Product version:
3, 5, 13, 0

Copyright:
2014

Trademarks:
No

Original file name:
DHelper

File type:
Executable application (Win32 EXE)

Bundler/Installer:
New IT Desktop Setup

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\microsoft\windows\temporary internet files\content.ie5\{random}\saveas.exe

Digital Signature
Signed by:

Authority:
GoDaddy.com, Inc.

Valid from:
6/3/2014 5:41:06 AM

Valid to:
8/15/2016 3:41:32 AM

Subject:
CN=Maxiget Limited, O=Maxiget Limited, L=Limassol, S=Cyprus, C=CY

Issuer:
CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US

Serial number:
043F9C868704FA

File PE Metadata
Compilation timestamp:
9/5/2014 12:53:24 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
768:yOwfivq/RsoZNUYbmSChHUborYp9vZ12CTCIG2q28J8:Q3mhhfYp9x12CTCqqzJ

Entry address:
0x3210

Entry point:
55, 8B, EC, 83, E4, F8, 83, EC, 0C, 53, 56, 57, 8D, 44, 24, 10, 50, C7, 44, 24, 14, 08, 00, 00, 00, C7, 44, 24, 18, 20, 00, 00, 00, FF, 15, 00, 40, 40, 00, 68, 28, 0A, 00, 00, 68, A0, 1F, B9, 00, 6A, 00, FF, 15, 94, 40, 40, 00, 6A, 00, 68, 80, 00, 00, 00, 6A, 03, 6A, 00, 6A, 01, 68, 00, 00, 00, 80, 68, A0, 1F, B9, 00, FF, 15, 8C, 40, 40, 00, 8B, F8, 83, FF, FF, 0F, 84, 30, 01, 00, 00, E8, BA, E3, FF, FF, 57, 8B, 3D, 90, 40, 40, 00, 8A, D8, FF, D7, 84, DB, 0F, 84, 18, 01, 00, 00, 66, 83, 3D, C8, A0, 40, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
9 KB (9,216 bytes)

The file saveas.exe has been seen being distributed by the following URL.

Remove saveas.exe - Powered by Reason Core Security