VistaCookiesCollector.exe

SweetIM VistaCookiesCollector

SweetIM Technologies Ltd

This is part of the Montera web browser toolbar and extension that will modify the browser's default search provider, DNS, and home page functions. The application VistaCookiesCollector.exe, “Vista SweetIM Cookies Collector” by SweetIM Technologies has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. It is also typically executed from the user's temporary directory.
Publisher:
SweetIM Technologies Ltd.  (signed by SweetIM Technologies Ltd)

Product:
SweetIM VistaCookiesCollector

Description:
Vista SweetIM Cookies Collector

Version:
2, 6, 0, 15

MD5:
336c0652aebc0f32aefe7dccfaefe570

SHA-1:
9005393bd7dc96f5e6f9489e775772ab4b0408e7

SHA-256:
2cd6c500426492b49ef8e74dfb76fc091036fe319a7bf9ee0423460a7abea546

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
9/30/2020 5:31:06 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Perion (M)
17.1.7.3

File size:
57.3 KB (58,680 bytes)

Product version:
2.6.0.15

Copyright:
Copyright © 2008 SweetIM Technologies Ltd.

Original file name:
VistaCookiesCollector.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\vistacookiescollector.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
2/6/2008 2:00:00 AM

Valid to:
2/6/2011 1:59:59 AM

Subject:
CN=SweetIM Technologies Ltd, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=SweetIM Technologies Ltd, L=Ra'anana, S=Israel, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2004 CA, OU=Terms of use at https://www.verisign.com/rpa (c)04, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
55DB0DA8C4245942769954A0086D7C36

File PE Metadata
Compilation timestamp:
1/13/2009 3:30:41 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
7.10

Entry address:
0x3690

Entry point:
6A, 60, 68, 88, B1, 40, 00, E8, 94, 14, 00, 00, BF, 94, 00, 00, 00, 8B, C7, E8, 98, 22, 00, 00, 89, 65, E8, 8B, F4, 89, 3E, 56, FF, 15, 2C, B0, 40, 00, 8B, 4E, 10, 89, 0D, 5C, DE, 40, 00, 8B, 46, 04, A3, 68, DE, 40, 00, 8B, 56, 08, 89, 15, 6C, DE, 40, 00, 8B, 76, 0C, 81, E6, FF, 7F, 00, 00, 89, 35, 60, DE, 40, 00, 83, F9, 02, 74, 0C, 81, CE, 00, 80, 00, 00, 89, 35, 60, DE, 40, 00, C1, E0, 08, 03, C2, A3, 64, DE, 40, 00, 33, F6, 56, 8B, 3D, 20, B0, 40, 00, FF, D7, 66, 81, 38, 4D, 5A, 75, 1F, 8B, 48, 3C, 03...
 
[+]

Developed / compiled with:
Microsoft Visual C++ v7.0

Code size:
37.5 KB (38,400 bytes)

Remove VistaCookiesCollector.exe - Powered by Reason Core Security