vktemy_1022019617f713d202ac947aaf399c.exe

JS Install system

Sergey Cherezov

The application vktemy_1022019617f713d202ac947aaf399c.exe by Sergey Cherezov has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. This is a setup and installation application and has been known to bundle potentially unwanted software. The file has been seen being downloaded from get-styles.ru.
Publisher:
Trioris LLC  (signed by Sergey Cherezov)

Product:
JS Install system

Description:
get-styles.exe

Version:
1, 0, 0, 1

MD5:
2d28c7b39f5db7a406dc9302f5097aff

SHA-1:
278d796cf70453d9d2c3ee58447e8090862f2e3f

SHA-256:
21ad02994fd0279d8fe7f9d0f8d7fb40efa15767bd1ef0b64d9839e95fe457db

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
4/27/2024 4:21:32 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.SergeyCh.Installer (M)
16.5.13.4

File size:
406.1 KB (415,800 bytes)

Product version:
1, 0, 0, 1

Copyright:
Trioris Copyright 2009

Trademarks:
Trioris LLC

Original file name:
get-styles.exe

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\vktemy_1022019617f713d202ac947aaf399c.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
9/3/2012 6:00:00 AM

Valid to:
9/4/2015 5:59:59 AM

Subject:
CN=Sergey Cherezov, O=Sergey Cherezov, STREET="V.Vysotskogo 3, 271", L=Novosibirsk, S=Novosibirsk, PostalCode=630133, C=RU

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00A410CB5D50A86EE0497305207A0287F9

File PE Metadata
Compilation timestamp:
9/27/2012 12:07:51 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
6144:Cv0AbhqCIJNMHLhgHj3l/L4dv5fENZrIjfAgqEW9fuHB3lWEKzw6jbya/BvYRoC1:CUCIPEgHj3l/EdRuGKzw6j2Q6m1ce

Entry address:
0x19549

Entry point:
E8, 9A, 7B, 00, 00, E9, 79, FE, FF, FF, CC, 68, B0, 95, 41, 00, 64, FF, 35, 00, 00, 00, 00, 8B, 44, 24, 10, 89, 6C, 24, 10, 8D, 6C, 24, 10, 2B, E0, 53, 56, 57, A1, B4, 61, 43, 00, 31, 45, FC, 33, C5, 50, 89, 65, E8, FF, 75, F8, 8B, 45, FC, C7, 45, FC, FE, FF, FF, FF, 89, 45, F8, 8D, 45, F0, 64, A3, 00, 00, 00, 00, C3, 8B, 4D, F0, 64, 89, 0D, 00, 00, 00, 00, 59, 5F, 5F, 5E, 5B, 8B, E5, 5D, 51, C3, CC, CC, CC, 8B, FF, 55, 8B, EC, 83, EC, 18, 53, 8B, 5D, 0C, 56, 8B, 73, 08, 33, 35, B4, 61, 43, 00, 57, 8B, 06...
 
[+]

Code size:
165.5 KB (169,472 bytes)

The file vktemy_1022019617f713d202ac947aaf399c.exe has been seen being distributed by the following URL.

Remove vktemy_1022019617f713d202ac947aaf399c.exe - Powered by Reason Core Security