windows7 loader activator.exe

safe instalL opt

This is the OutBrowse Revenyou installer which bundles offers for additional third party applications that may be unwanted and installed without consent. The application windows7 loader activator.exe by safe instalL opt has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the OutBrowse Revenyou installer. The file has been seen being downloaded from get.0134g.info.
Publisher:
IJSYZ  (signed by safe instalL opt)

Product:
IJSYZ

Version:
7837.1568.1368.3059

MD5:
b28054f3ffb3269c0f758eae89b5a506

SHA-1:
c5948bda23da34fa4d1c9fc841ab60b97ce18dfc

SHA-256:
2af466e1d09049e4d3b45240c7a0db897373673fe1bfe7b8ae54759df0cb2a9f

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
5/21/2024 3:47:45 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Outbrowse (M)
16.10.12.14

File size:
758.3 KB (776,504 bytes)

Product version:
7837.1568.1368.3059

Copyright:
IJSYZ

Trademarks:
IJSYZ

File type:
Executable application (Win32 EXE)

Bundler/Installer:
OutBrowse Revenyou (using Nullsoft Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\windows7 loader activator.exe

Digital Signature
Authority:
thawte, Inc.

Valid from:
6/4/2015 5:30:00 AM

Valid to:
1/28/2016 5:29:59 AM

Subject:
CN=safe instalL opt, O=safe instalL opt, L=Dublin, S=Dublin, C=IE

Issuer:
CN=thawte SHA256 Code Signing CA, O="thawte, Inc.", C=US

Serial number:
7CE9482E21CE2D394DA3648C8B5C135C

File PE Metadata
Compilation timestamp:
12/6/2009 4:22:12 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:aRqytKMoYuGCGV8zarOZaT4DUuRBZs489liWDeCNd3W9ffrruKdtfc8vy4h:arBuaV8zaKZ84NB+4miWDzjm9LRy86

Entry address:
0x30FA

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 18, 1C, 45, 00, E8, F1, 2B, 00, 00, A3, 64, 1B, 45, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 98, 37, 43, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 60, DB, 44, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, A0, 47, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Entropy:
7.9775

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

The file windows7 loader activator.exe has been seen being distributed by the following URL.

http://get.0134g.info/.../1433781888/1433781888?41922318559Y2RrNDY8bzUwLy0yJVs7Ly81LDIhYzkwKS4zMSVmOCwdYmhjY2xebF04UmBqY2Z1cTQkKitHZl1jXHAjLy85Xm9gcmBrbXAjaFtqaTQuNB14Z208KA

Remove windows7 loader activator.exe - Powered by Reason Core Security