air71d.exe

Woolik technologies ltd

The application air71d.exe by Woolik technologies ltd has been detected as adware by 11 anti-malware scanners. This is a setup program which is used to install the application. This will display context specific advertisements in the browser as well as attempt to modify the browser's search provider. It is also typically executed from the user's temporary directory. The file has been seen being downloaded from cdninst.com.
Publisher:
Woolik technologies ltd  (signed and verified)

MD5:
e32f7eb50053552ca87b70885123c349

SHA-1:
bbe28c9938e280153c65a9cd47f188732b8afa5f

SHA-256:
c4573a133677d559ada9038590e4d97b73720416bfbdbe90f8d3b28dc74c0cfa

Scanner detections:
11 / 68

Status:
Adware

Analysis date:
12/23/2024 11:53:22 PM UTC  (a few moments ago)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.Downloader
7.1.1

Bkav FE
W32.Clod411.Trojan
1.3.0.4959

Dr.Web
Adware.Babylon.14
9.0.1.0269

ESET NOD32
Win32/Toolbar.Babylon (variant)
8.10321

Fortinet FortiGate
Riskware/Toolbar_Webalta
9/26/2014

herdProtect (fuzzy)
2014.12.8.15

K7 AntiVirus
Trojan
13.183.13166

McAfee
Artemis!E32F7EB50053
5600.6995

Qihoo 360 Security
HEUR/Malware.QVM20.Gen
1.0.0.1015

Reason Heuristics
PUP.Wooliktechnologiesltd.G
14.9.26.17

VIPRE Antivirus
Trojan.Win32.Generic
32582

File size:
768 KB (786,440 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\temp\air71d.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
7/25/2013 1:00:00 AM

Valid to:
7/26/2014 12:59:59 AM

Subject:
CN=Woolik technologies ltd, OU=Digital ID Class 3 - Microsoft Software Validation v2, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Woolik technologies ltd, L=Or Yeuda, S=israel, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
233D2998915945A85914A5071B609336

File PE Metadata
Compilation timestamp:
7/31/2013 9:41:47 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
24576:ijEL/iGTTvBSNmveWQXOF9DaJZjIMUMSn5EtVYs:ijg/b/Tv9AOfwZUxMSn5eYs

Entry address:
0x1C48

Entry point:
55, 8B, EC, 83, E4, F8, B8, 7C, 1A, 00, 00, E8, C8, 62, 00, 00, 53, 56, 33, DB, 57, 8D, 8C, 24, E0, 07, 00, 00, 88, 5C, 24, 0E, C6, 44, 24, 0F, 01, E8, FE, 1A, 00, 00, 53, 89, 9C, 24, 3C, 0A, 00, 00, 89, 9C, 24, 40, 0A, 00, 00, 89, 9C, 24, 44, 0A, 00, 00, C7, 84, 24, 48, 0A, 00, 00, 03, 00, 00, 00, FF, 94, 24, 20, 08, 00, 00, 8D, 8C, 24, E0, 07, 00, 00, 89, 84, 24, 34, 0A, 00, 00, E8, 6D, FA, FF, FF, 8D, 8C, 24, E0, 07, 00, 00, E8, DF, FA, FF, FF, 85, C0, 0F, 85, 05, 01, 00, 00, 8D, 44, 24, 10, 50, 8D, 8C...
 
[+]

Entropy:
7.9232

Developed / compiled with:
Microsoft Visual C++

Code size:
30 KB (30,720 bytes)

The file air71d.exe has been seen being distributed by the following URL.

Remove air71d.exe - Powered by Reason Core Security