adwcleaner.zip
The file adwcleaner.zip has been detected as a potentially unwanted program by 24 anti-malware scanners. It uses the Solimba download manager to push adware offers during the download and setup process. Bundled adware includes search and shopping web browser toolbars. The file has been seen being downloaded from get.jockcard.com.
MD5:
ea992ad17beb10f1cabe00af223fd12b
SHA-1:
0f7584ec7e45839f5fa7116485ef90909a681191
SHA-256:
23b50fa43011ca951d993fae96bade3c9a17540ece8580ea59de4aa2729eccd5
Scanner detections:
24 / 68
Status:
Potentially unwanted
Explanation:
Uses the Solimba installer to bundle adware offers.
Analysis date:
11/24/2024 12:41:22 PM UTC (today)
Scan engine
Detection
Engine version
Lavasoft Ad-Aware
Gen:Variant.Adware.Graftor.190520
5727910
Avira AntiVirus
ADWARE/MultiPlug.Gen4
8.3.2.2
Arcabit
Trojan.Adware.Graftor.D2E838
1.0.0.582
avast!
Win32:Adware-gen [Adw]
2014.9-151010
Bitdefender
Gen:Variant.Adware.Graftor.190520
1.0.20.1415
Clam AntiVirus
Win.Adware.Graftor-1382
0.98/20958
Dr.Web
infected with Trojan.Solimba.31
9.0.1.05190
Emsisoft Anti-Malware
Gen:Variant.Adware.Graftor.190520
10.0.0.5366
ESET NOD32
Win32/Solimba.C potentially unwanted application
7.0.302.0
F-Prot
W32/S-f70e6350
v6.4.7.1.166
F-Secure
Gen:Variant.Adware.Graftor
11.2015-10-10_7
G Data
Gen:Variant.Adware.Graftor.190520
15.10.25
IKARUS anti.virus
Trojan-Dropper.Win32.Addrop
t3scan.1.9.5.0
K7 AntiVirus
Trojan
13.210.17494
Kaspersky
not-a-virus:HEUR:Downloader.Win32.Morstar
14.0.0.1295
Microsoft Security Essentials
Threat.Undefined
1.207.2059.0
MicroWorld eScan
Gen:Variant.Adware.Graftor.190520
16.0.0.849
NANO AntiVirus
Trojan.Win32.Morstar.dvanff
0.30.26.3947
Norman
Gen:Variant.Adware.Graftor.190520
10.10.2015 03:41:45
Quick Heal
TrojanDropper.Morstar.BA6
10.15.14.00
Rising Antivirus
PE:Malware.RDM.09!5.F[F1]
23.00.65.151008
Sophos
PUA 'Solimba Installer'
5.19
VIPRE Antivirus
Solimba
44446
File size:
496.4 KB (508,298 bytes)
Common path:
C:\users\{user}\downloads\adwcleaner.zip
The file adwcleaner.zip has been seen being distributed by the following URL.