bundle_flowsurfcb.exe

Leoric demo

Resaikl.IT, TOV

The application bundle_flowsurfcb.exe by Resaikl.IT, TOV has been detected as a potentially unwanted program by 5 anti-malware scanners. It bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install.
Publisher:
WrithKing Co  (signed by Resaikl.IT, TOV)

Product:
Leoric demo

Version:
7.23.14.56

MD5:
ff81a48ffc86ff538b4a24cb6cec14e0

SHA-1:
2819775051c192c5d47c365d6e3484b120baa680

SHA-256:
5e1fb01658d6ee5d851503c0ac38d084c4d676d4bfb1d02692d708e43e9f7daf

Scanner detections:
5 / 68

Status:
Potentially unwanted

Analysis date:
12/23/2024 11:14:12 AM UTC  (today)

Scan engine
Detection
Engine version

Dr.Web
Trojan.Amonetize.12844
9.0.1.05190

ESET NOD32
Win32/Amonetize.RC potentially unwanted application
8.0.319.0

Microsoft Security Essentials
Threat.Undefined
1.217.1131.0

Norman
Trojan.GenericKD.3150920
10.04.2016 15:29:17

Reason Heuristics
PUP.Amonetize.ResaiklI (M)
16.4.12.23

File size:
315 KB (322,568 bytes)

Product version:
5.4.7.16

Original file name:
leo.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\bundle_flowsurfcb.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
4/1/2016 2:00:00 AM

Valid to:
4/2/2017 1:59:59 AM

Subject:
CN="Resaikl.IT, TOV", OU=IT, O="Resaikl.IT, TOV", STREET="Vulytsya Artema, Budynok 1/5, Ofis 712", L=Kiev, S=Kiev, PostalCode=04053, C=UA

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
5B2F0BE59A06CB06B01368594B8E93A4

File PE Metadata
Compilation timestamp:
4/11/2016 5:13:25 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
3072:7TYXPwoqOQvxejlLLJ+wSPHTkpczdEL+9t3ECWbY6iKFCMKghoqSesJP3mpmscRn:qPHqxeBpS/aMdz3EfKQobnPtJxs+bsED

Entry address:
0x850B

Entry point:
E8, 64, 1C, 00, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 83, 7D, 08, 00, 74, 2D, FF, 75, 08, 6A, 00, FF, 35, 2C, FA, 3B, 00, FF, 15, 58, 50, 3B, 00, 85, C0, 75, 18, 56, E8, 3B, 0F, 00, 00, 8B, F0, FF, 15, 14, 50, 3B, 00, 50, E8, 40, 0F, 00, 00, 59, 89, 06, 5E, 5D, C3, CC, CC, CC, 8B, 54, 24, 0C, 8B, 4C, 24, 04, 85, D2, 74, 7F, 0F, B6, 44, 24, 08, 0F, BA, 25, EC, F3, 3B, 00, 01, 73, 0D, 8B, 4C, 24, 0C, 57, 8B, 7C, 24, 08, F3, AA, EB, 5D, 8B, 54, 24, 0C, 81, FA, 80, 00, 00, 00, 7C, 0E, 0F, BA, 25, 58, DF, 3B, 00...
 
[+]

Code size:
79 KB (80,896 bytes)

Remove bundle_flowsurfcb.exe - Powered by Reason Core Security