additionaloffers-setup-42706563.exe

Left Click Media

The application additionaloffers-setup-42706563.exe by Left Click Media has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. The file has been seen being downloaded from int6.cdn.hw.routinetrends.com and multiple other hosts.
Publisher:
Left Click Media  (signed and verified)

MD5:
4ef3e7ec677824d1629ae6a9f5eae086

SHA-1:
ee7ccd8c49c38058a8318b831ed648f661549f6d

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
12/26/2024 11:14:39 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Vitallia.LeftClickMedia.Installer (M)
16.2.9.22

File size:
94.2 KB (96,464 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\Documents and Settings\{user}\Local settings\temp\{random}.tmp\additionaloffers-setup-42706563.exe

Digital Signature
Authority:
GoDaddy.com, Inc.

Valid from:
12/9/2015 1:45:40 AM

Valid to:
12/9/2016 1:45:40 AM

Subject:
CN=Left Click Media, O=Left Click Media, L="Oakland ", S=California, C=US

Issuer:
CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US

Serial number:
04DFA3D52CDF7375

File PE Metadata
Compilation timestamp:
1/15/2016 11:28:51 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
1536:HavII5zCSz9MQ2nPCjA9Kw+TkYExOcucWw1BsWjcdNkV1GZtBNFx:eJVb1Hw+9cjuNq1GZtpx

Entry address:
0x2E1D

Entry point:
E8, FC, 41, 00, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, FF, 15, A4, F0, 40, 00, 6A, 01, A3, C4, 64, 41, 00, E8, 49, 47, 00, 00, FF, 75, 08, E8, DE, 46, 00, 00, 83, 3D, C4, 64, 41, 00, 00, 59, 59, 75, 08, 6A, 01, E8, 2F, 47, 00, 00, 59, 68, 09, 04, 00, C0, E8, AC, 46, 00, 00, 59, 5D, C3, 55, 8B, EC, 81, EC, 24, 03, 00, 00, 6A, 17, E8, 9C, BF, 00, 00, 85, C0, 74, 05, 6A, 02, 59, CD, 29, A3, A8, 62, 41, 00, 89, 0D, A4, 62, 41, 00, 89, 15, A0, 62, 41, 00, 89, 1D, 9C, 62, 41, 00, 89, 35, 98, 62, 41, 00, 89, 3D, 94...
 
[+]

Entropy:
6.4896

Code size:
56 KB (57,344 bytes)

The file additionaloffers-setup-42706563.exe has been seen being distributed by the following 50 URLs.

http://int6.cdn.hw.routinetrends.com/dl-pure/1200195/.../?bc=1200195&checksum=43215379&cb=316838834&usefilename=true&executableroutePath1199715&stub=true

http://int6.cdn.hw.routinetrends.com/dl-pure/1200193/.../?bc=1200193&checksum=43215289&cb=1955314089&usefilename=true&executableroutePath1199715&stub=true

http://int6.cdn.hw.routinetrends.com/dl-pure/1200193/.../?bc=1200193&checksum=43215289&cb=-836304760&usefilename=true&executableroutePath1199715&stub=true

http://int6.cdn.hw.routinetrends.com/dl-pure/1200193/.../?bc=1200193&checksum=43215289&cb=450506144&usefilename=true&executableroutePath1199715&stub=true

http://int6.cdn.hw.routinetrends.com/dl-pure/1200193/.../?bc=1200193&checksum=43215313&cb=-1600016091&usefilename=true&executableroutePath1199715&stub=true

http://int6.cdn.hw.routinetrends.com/dl-pure/1200193/.../?bc=1200193&checksum=43215313&cb=-73333926&usefilename=true&executableroutePath1199715&stub=true

http://int6.cdn.hw.routinetrends.com/dl-pure/1200193/.../?bc=1200193&checksum=43215313&cb=1949834725&usefilename=true&executableroutePath1199715&stub=true

http://int6.cdn.hw.routinetrends.com/dl-pure/1200195/.../?bc=1200195&checksum=43215763&cb=982339160&usefilename=true&executableroutePath1199715&stub=true

http://int6.cdn.hw.routinetrends.com/dl-pure/1200193/.../?bc=1200193&checksum=43215813&cb=726848184&usefilename=true&executableroutePath1199715&stub=true

http://int6.cdn.hw.routinetrends.com/dl-pure/1200193/.../?bc=1200193&checksum=43215289&cb=-1783243440&usefilename=true&executableroutePath1199715&stub=true

http://int6.cdn.hw.routinetrends.com/dl-pure/1200195/.../?bc=1200195&checksum=43216877&cb=890308743&usefilename=true&executableroutePath1199715&stub=true

http://int6.cdn.hw.routinetrends.com/dl-pure/1200195/.../?bc=1200195&checksum=43216505&cb=-334188329&usefilename=true&executableroutePath1199715&stub=true

http://int6.cdn.hw.routinetrends.com/dl-pure/1200193/.../?bc=1200193&checksum=43215293&cb=-738703319&usefilename=true&executableroutePath1199715&stub=true

http://int6.cdn.hw.routinetrends.com/dl-pure/1200193/.../?bc=1200193&checksum=43215483&cb=-364050920&usefilename=true&executableroutePath1199715&stub=true

http://int6.cdn.hw.routinetrends.com/dl-pure/1200193/.../?bc=1200193&checksum=43215289&cb=1096279608&usefilename=true&executableroutePath1199715&stub=true

http://int6.cdn.hw.routinetrends.com/dl-pure/1200195/.../?bc=1200195&checksum=43216877&cb=365989600&usefilename=true&executableroutePath1199715&stub=true

http://int6.cdn.hw.routinetrends.com/dl-pure/1200193/.../?bc=1200193&checksum=43215675&cb=1262023978&usefilename=true&executableroutePath1199715&stub=true

http://int6.cdn.hw.routinetrends.com/dl-pure/1200193/.../?bc=1200193&checksum=43215969&cb=-1722734429&usefilename=true&executableroutePath1199715&stub=true

http://int6.cdn.hw.routinetrends.com/dl-pure/1200195/.../?bc=1200195&checksum=43216865&cb=863033124&usefilename=true&executableroutePath1199715&stub=true

http://int6.cdn.hw.routinetrends.com/dl-pure/1200193/.../?bc=1200193&checksum=43215289&cb=-988615203&usefilename=true&executableroutePath1199715&stub=true

http://int6.cdn.hw.routinetrends.com/dl-pure/1200193/.../?bc=1200193&checksum=43215357&cb=-312507503&usefilename=true&executableroutePath1199715&stub=true

http://int6.cdn.hw.routinetrends.com/dl-pure/1200193/.../?bc=1200193&checksum=43215399&cb=-1575763580&usefilename=true&executableroutePath1199715&stub=true

http://int6.cdn.hw.routinetrends.com/dl-pure/1200193/.../?bc=1200193&checksum=43215357&cb=1160242143&usefilename=true&executableroutePath1199715&stub=true

http://int6.cdn.hw.routinetrends.com/dl-pure/1200195/.../?bc=1200195&checksum=43215763&cb=-1417850323&usefilename=true&executableroutePath1199715&stub=true

http://int6.cdn.hw.routinetrends.com/dl-pure/1200195/.../?bc=1200195&checksum=43215611&cb=1254368515&usefilename=true&executableroutePath1199715&stub=true

http://int6.cdn.hw.routinetrends.com/dl-pure/1200193/.../?bc=1200193&checksum=43215483&cb=1353021605&usefilename=true&executableroutePath1199715&stub=true

http://int6.cdn.hw.routinetrends.com/dl-pure/1200193/.../?bc=1200193&checksum=43215975&cb=-162110292&usefilename=true&executableroutePath1199715&stub=true

http://int6.cdn.hw.routinetrends.com/dl-pure/1200195/.../?bc=1200195&checksum=43215433&cb=167239271&usefilename=true&executableroutePath1199715&stub=true

http://int6.cdn.hw.routinetrends.com/dl-pure/1200193/.../?bc=1200193&checksum=43215283&cb=1805249253&usefilename=true&executableroutePath1199715&stub=true

http://int6.cdn.hw.routinetrends.com/dl-pure/1200195/.../?bc=1200195&checksum=43215449&cb=560257357&usefilename=true&executableroutePath1199715&stub=true

Latest 30 of 554 download URLs

Remove additionaloffers-setup-42706563.exe - Powered by Reason Core Security