{blocked}.exe

The application {blocked}.exe has been detected as a potentially unwanted program by 24 anti-malware scanners. This is a setup program which is used to install the application. The setup program bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install. The file has been seen being downloaded from www.funnier-download.com.
Version:
1.1.5.26

MD5:
4b18a4b8087bd17802b8ff5462e36709

SHA-1:
f4dab843dad0c77e7307a6a5e0b9859087408965

SHA-256:
2a6436f69d6380c029b9dd7892900003a7e7b97e1ce78e6afae56cd561534b37

Scanner detections:
24 / 68

Status:
Potentially unwanted

Analysis date:
11/5/2024 10:25:26 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Application.Bundler.Amonetize.21
737

Agnitum Outpost
PUA.Amonetize
7.1.1

AhnLab V3 Security
PUP/Win32.Amonetize
2015.01.26

Avira AntiVirus
ADWARE/Adware.Gen4
7.11.205.2

avast!
Win32:PUP-gen [PUP]
2014.9-150128

Baidu Antivirus
Adware.Win32.Amonetize
4.0.3.15128

Bitdefender
Gen:Variant.Application.Bundler.Amonetize.21
1.0.20.140

Dr.Web
Trojan.Adfltnet.71
9.0.1.028

ESET NOD32
Win32/Amonetize.DE (variant)
9.11069

Fortinet FortiGate
Riskware/Amonetize
1/28/2015

F-Secure
Gen:Variant.Application.Bundler
11.2015-28-01_4

G Data
Gen:Variant.Application.Bundler.Amonetize.21
15.1.24

K7 AntiVirus
Trojan
13.192.14746

Kaspersky
not-a-virus:AdWare.Win32.Amonetize
14.0.0.2571

Malwarebytes
PUP.Optional.Bundle
v2015.01.28.06

McAfee
GenericR-CTH!4B18A4B8087B
5600.6871

MicroWorld eScan
Gen:Variant.Application.Bundler.Amonetize.21
16.0.0.84

NANO AntiVirus
Trojan.Win32.Adfltnet.dlwosi
0.30.0.64812

Panda Antivirus
Trj/Genetic.gen
15.01.28.06

Qihoo 360 Security
HEUR/QVM10.1.Malware.Gen
1.0.0.1015

Sophos
Generic PUA PE
4.98

Trend Micro House Call
Suspicious_GEN.F47V0115
7.2.28

VIPRE Antivirus
Trojan.Win32.Generic
36960

Zillya! Antivirus
Adware.Amonetize.Win32.2045
2.0.0.2045

File size:
459.5 KB (470,528 bytes)

Product version:
1.1.5.26

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\iphone activation bypass downloader__3687_i1448416556_il1145099.exe

File PE Metadata
Compilation timestamp:
1/14/2015 3:56:53 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
6144:hiktmMRDn7WjRTTl1ZIQeF4jnns465uWqpXytg5oU3VXyZ89YIUZXLlajzNBYtE2:hpFLajNB1ZIsjki8tpyk89ZUlR6tFHc

Entry address:
0x12358

Entry point:
E8, 9B, 4B, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, 3D, 04, 2F, 3B, 00, 00, 75, 18, E8, 79, 35, 00, 00, 6A, 1E, E8, C3, 33, 00, 00, 68, FF, 00, 00, 00, E8, F0, F8, FF, FF, 59, 59, 8B, 45, 08, 85, C0, 75, 01, 40, 50, 6A, 00, FF, 35, 04, 2F, 3B, 00, FF, 15, C8, B0, 3A, 00, 5D, C3, 8B, FF, 55, 8B, EC, 53, 8B, 5D, 08, 83, FB, E0, 77, 6F, 56, 57, 83, 3D, 04, 2F, 3B, 00, 00, 75, 18, E8, 2F, 35, 00, 00, 6A, 1E, E8, 79, 33, 00, 00, 68, FF, 00, 00, 00, E8, A6, F8, FF, FF, 59, 59, 85, DB, 74, 04, 8B, C3...
 
[+]

Code size:
166 KB (169,984 bytes)

The file {blocked}.exe has been seen being distributed by the following URL.

Remove {blocked}.exe - Powered by Reason Core Security