vkpbucsqnjvdu.exe

Ge-Force

Webar

The application vkpbucsqnjvdu.exe, “Ge-Force Installer” has been detected as adware by 20 anti-malware scanners. The program is a setup application that uses the Nullsoft Install System installer, however the file is not signed with an authenticode signature from a trusted source. It is built using the Crossrider cross-browser extension toolkit. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider.
Publisher:
Webar

Product:
Ge-Force

Description:
Ge-Force Installer

Version:
1.36.01.22

MD5:
1c74f302d09a706adece0dce3a75500d

SHA-1:
5eea7e38952ab26c14cf64892e60032512bbd0bf

SHA-256:
7710f924a1d60f182059ffff9770b114fd81bf89d1f348fb3b944e6a18fb0cc2

Scanner detections:
20 / 68

Status:
Adware

Explanation:
This is part of the Crossrider Internet browser extension framework which may modify the user's web browser settings including changing the home and search pages.

Note:
Crossrider is the owner of a platform that enables the creation of cross-browser extensions by developers but is not the owner of this detected application.

Analysis date:
4/19/2024 9:18:26 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.JS.Crossrider.B
5627563

AhnLab V3 Security
PUP/Win32.CrossRider
2015.06.02

Avira AntiVirus
ADWARE/CrossRider.Gen7
8.3.1.6

AVG
Crossrider
2016.0.3091

Dr.Web
infected with Trojan.Crossrider.46916
9.0.1.05190

ESET NOD32
Win32/Toolbar.CrossRider.CM potentially unwanted application
7.0.302.0

Fortinet FortiGate
Riskware/CrossRider
6/2/2015

G Data
Script.Application.Plush
15.6.25

Malwarebytes
PUP.Optional.GeForce.A
v2015.06.02.11

McAfee
Trojan.Artemis!B914A7281ABA
18.0.204.0

MicroWorld eScan
Adware.JS.Crossrider.B
16.0.0.459

Panda Antivirus
Trj/Genetic.gen
15.06.02.11

Qihoo 360 Security
HEUR/QVM30.1.Malware.Gen
1.0.0.1015

Reason Heuristics
PUP.Downloader.Installer
15.6.2.5

Rising Antivirus
PE:Malware.Adload!6.1D9D
23.00.65.15531

Trend Micro House Call
Suspici.2DBCF6CF
7.2.153

Trend Micro
ADW_CROSSRIDER
10.465.02

Vba32 AntiVirus
suspected of Trojan.Downloader.gen.h
3.12.26.4

VIPRE Antivirus
Threat.4150696
40552

Zillya! Antivirus
Trojan.BlackGen.Win32.11
2.0.0.2201

File size:
10.3 MB (10,818,226 bytes)

Copyright:
Copyright Webar

File type:
Executable application (Win32 EXE)

Installer:
Nullsoft Install System

Language:
English (United States)

Common path:
C:\Documents and Settings\{user}\Local settings\temp\{random}.tmp\vkpbucsqnjvdu.exe

File PE Metadata
Compilation timestamp:
12/4/2012 10:55:02 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.22

CTPH (ssdeep):
196608:zt/OiONpUZi4WxE6/Y/kiTywBK+2FiB4CXxdUx5xaX557zsxBdOjlN:zFepUI4r4wVB4CX8x5cbsxB4jX

Entry address:
0x4323

Entry point:
55, 89, E5, 57, 56, 53, 81, EC, AC, 01, 00, 00, FF, 15, 74, C3, 44, 00, C7, 04, 24, 01, 80, 00, 00, FF, 15, 58, C4, 44, 00, 53, C7, 04, 24, 00, 00, 00, 00, FF, 15, 98, C4, 44, 00, 56, A3, 40, 3B, 44, 00, C7, 04, 24, 08, 00, 00, 00, E8, 8D, 3B, 00, 00, A3, 9C, 3B, 44, 00, 8D, 85, 84, FE, FF, FF, 57, C7, 44, 24, 10, 00, 00, 00, 00, C7, 44, 24, 0C, 60, 01, 00, 00, 89, 44, 24, 08, C7, 44, 24, 04, 00, 00, 00, 00, C7, 04, 24, 01, B3, 40, 00, FF, 15, AC, C4, 44, 00, 83, EC, 14, C7, 44, 24, 04, 02, B3, 40, 00, C7...
 
[+]

Code size:
34.5 KB (35,328 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to tlb.hwcdn.net  (69.16.175.42:80)

TCP (HTTP):
Connects to s3-website-us-east-1.amazonaws.com  (54.231.17.196:80)

TCP (HTTP):
Connects to ec2-54-243-224-121.compute-1.amazonaws.com  (54.243.224.121:80)

TCP (HTTP):
Connects to ec2-23-21-223-98.compute-1.amazonaws.com  (23.21.223.98:80)

Remove vkpbucsqnjvdu.exe - Powered by Reason Core Security