bundle_flowsurfcb.exe

NewYork Rangers & Co

Svord Develop, TOV

The application bundle_flowsurfcb.exe, “NewYork Rangers Ltd” by Svord Develop, TOV has been detected as a potentially unwanted program by 2 anti-malware scanners. This is a setup program which is used to install the application. It bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install. The file has been seen being downloaded from www.power-ful.xyz.
Publisher:
NewYork Rangers  (signed by Svord Develop, TOV)

Product:
NewYork Rangers & Co

Description:
NewYork Rangers Ltd

Version:
3.6.1.35

MD5:
27c91d6d53c1724c7b64c0665411030b

SHA-1:
163a303b0daea19110bca21a25a602bf948c35c7

SHA-256:
d6906587de1085125ff4d91178b362f8943b7147c36b40a8a280ea3439559808

Scanner detections:
2 / 68

Status:
Potentially unwanted

Analysis date:
12/23/2024 11:06:23 AM UTC  (today)

Scan engine
Detection
Engine version

Kaspersky
not-a-virus:AdWare.Win32.Amonetize
15.0.0.562

Reason Heuristics
PUP.Amonetize.SvordDev (M)
16.5.3.16

File size:
393 KB (402,432 bytes)

Product version:
3.6.1.35

Original file name:
rangers.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\microsoft\windows\inetcache\ie\{random}\bundle_flowsurfcb.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
4/18/2016 2:00:00 AM

Valid to:
4/19/2017 1:59:59 AM

Subject:
CN="Svord Develop, TOV", OU=IT, O="Svord Develop, TOV", STREET="vul. Glybochytska, 72", L=Kiev, S=Kiev, PostalCode=04655, C=UA

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
008C67EC4AE623D55245F8224EB6A1C594

File PE Metadata
Compilation timestamp:
5/2/2016 7:09:55 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
6144:3Pz3w2Uc1RKBcvGw3bNMd6l6dHoc5lQDrVvzk6VyDtT:3Pz3weRD13asl68Dri6VyDtT

Entry address:
0x26C1

Entry point:
E8, 5D, 28, 00, 00, E9, 73, FE, FF, FF, 55, 8B, EC, 8B, 45, 08, 56, 8B, F1, 83, 66, 04, 00, C7, 06, 90, 01, 3A, 00, C6, 46, 08, 00, FF, 30, E8, A8, 00, 00, 00, 8B, C6, 5E, 5D, C2, 04, 00, 55, 8B, EC, 8B, 45, 08, C7, 01, 90, 01, 3A, 00, 8B, 00, 89, 41, 04, C6, 41, 08, 00, 8B, C1, 5D, C2, 08, 00, 55, 8B, EC, 56, FF, 75, 08, 8B, F1, 83, 66, 04, 00, C7, 06, 90, 01, 3A, 00, C6, 46, 08, 00, E8, 12, 00, 00, 00, 8B, C6, 5E, 5D, C2, 04, 00, C7, 01, 90, 01, 3A, 00, E9, 96, 00, 00, 00, 55, 8B, EC, 56, 57, 8B, 7D, 08...
 
[+]

Code size:
58.5 KB (59,904 bytes)

The file bundle_flowsurfcb.exe has been seen being distributed by the following URL.

http://www.power-ful.xyz/.../Bundle_FlowsurfCB.exe

Remove bundle_flowsurfcb.exe - Powered by Reason Core Security