spyalert64.exe

Spy Alert

Long Mile Solutions, LLC

This is part of an adware program designed to inject advertising in the web browser (banners, text-links) as well as modify the normal behavior of the browser as well as modify the computer’s system settings that control applications to run on startup. Part of the Injekt brand of unwanted programs. The application spyalert64.exe by Long Mile Solutions has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat.
Publisher:
Long Mile Solutions, LLC  (signed and verified)

Product:
Spy Alert

Description:
SpyAlert

Version:
1.0.0.0

MD5:
5b5cdb90353d4d3c14d14ebb66786f25

SHA-1:
782a02a97388b578823b4c6fdc6b793d2fc66bad

SHA-256:
7f22793f9345b3aecebed32b6d3a31a65b56b1b48ddc9ce073ed9aca09ad739c

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Injects display ads (banner ads), in-text ads, interstitial ads, or other types of ads in the web browser as well as alters the browsers settings (home page, search, DNS, and security protocols).

Analysis date:
6/17/2025 5:46:02 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Injekt.LongMile (M)
16.3.18.8

File size:
48.8 KB (49,984 bytes)

Product version:
1.0.0.0

Copyright:
Copyright © Long Mile Solutions, LLC 2014

Original file name:
SpyAlert.exe

File type:
Executable application (Win64 EXE)

Language:
Language Neutral

Common path:
C:\ProgramData\spyalert\spyalert64.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
5/19/2014 8:00:00 PM

Valid to:
5/20/2015 7:59:59 PM

Subject:
CN="Long Mile Solutions, LLC", O="Long Mile Solutions, LLC", L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
6015F7C4F3F065B548DA2303F218785D

File PE Metadata
Compilation timestamp:
8/29/2014 7:31:32 AM

OS version:
4.0

OS bitness:
Win64

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
768:UbOJ/E2fSrDGLBTisWWft3NPMNd8hWH35B+zneuRI7z7BGlMv8czZ:f/7w6YaV1ajH3Xd7z7WMv8K

Entry address:
0xBF8E

Entry point:
48, A1, 00, 20, 00, 40, 00, 00, 00, 00, FF, E0, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
7.6484

Code size:
40 KB (40,960 bytes)

Remove spyalert64.exe - Powered by Reason Core Security