downloadfilesetup__2299_i1186035627_il3.exe

TEHSNABSTROY LLC

This is the Amonetize download manager which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application downloadfilesetup__2299_i1186035627_il3.exe by TEHSNABSTROY has been detected as adware by 19 anti-malware scanners. The program is a setup application that uses the TUGUU DomaIQ Setup installer. The setup program bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install.
Publisher:
TEHSNABSTROY LLC  (signed and verified)

Version:
1.1.5.27

MD5:
0d6184b101790a0f6fc30de22be4564c

SHA-1:
c02a61a263c78154633f0d757252a89ceb60828d

SHA-256:
9cbc486a8ebb52857d55ec5f291e987321cbf654f7a9b84b79f6b1531bfe5248

Scanner detections:
19 / 68

Status:
Adware

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/23/2024 10:57:08 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Application.Bundler.Amonetize.12
785

Agnitum Outpost
PUA.Amonetize
7.1.1

AhnLab V3 Security
PUP/Win32.Amonetize
2014.08.18

AVG
Generic
2015.0.3263

Baidu Antivirus
Adware.Win32.Amonetize
4.0.3.141212

Bitdefender
Gen:Variant.Application.Bundler.Amonetize.12
1.0.20.1730

Dr.Web
Adware.Downware.8012
9.0.1.0346

ESET NOD32
Win32/Amonetize.BM (variant)
8.10271

F-Secure
Gen:Variant.Application.Bundler
11.2014-12-12_6

G Data
Gen:Variant.Application.Bundler.Amonetize.12
14.12.24

Kaspersky
not-a-virus:AdWare.Win32.Amonetize
14.0.0.2808

Malwarebytes
PUP.Optional.Amonetize
v2014.12.12.10

McAfee
Artemis!0D6184B10179
5600.6919

MicroWorld eScan
Gen:Variant.Application.Bundler.Amonetize.12
15.0.0.1038

NANO AntiVirus
Riskware.Win32.Amonetize.ddtnan
0.28.2.61519

Panda Antivirus
Trj/CI.A
14.12.12.10

Qihoo 360 Security
Win32/Application.c7d
1.0.0.1015

Reason Heuristics
PUP.Installer.TEHSNABSTROY.h
14.12.12.10

Trend Micro House Call
Suspicious_GEN.F47V0817
7.2.346

File size:
439.6 KB (450,120 bytes)

Product version:
1.1.5.27

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
TUGUU DomaIQ Setup

Language:
English (United States)

Common path:
C:\users\{user}\downloads\downloadfilesetup__2299_i1186035627_il3.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
6/19/2014 4:30:00 AM

Valid to:
6/20/2015 4:29:59 AM

Subject:
CN=TEHSNABSTROY LLC, O=TEHSNABSTROY LLC, STREET="UL. NIKOLYAMSKAYA, 9", L=G. MOSKVA, S=G. MOSKVA, PostalCode=109240, C=RU

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00F4B1A67457808CFF0300CD93C4050F05

File PE Metadata
Compilation timestamp:
8/8/2014 7:44:44 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
6144:IVFfnQdPbJWDkTB0qQkoJnG0EyvktrHInqEelskBP7Mbwset0WOyN/p/UHvJo7iR:IVV0zJWDkTdl1tLInIsk17Mb494PGiR

Entry address:
0x10FBF

Entry point:
E8, E2, 56, 00, 00, E9, 89, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, 51, 8D, 4C, 24, 04, 2B, C8, 1B, C0, F7, D0, 23, C8, 8B, C4, 25, 00, F0, FF, FF, 3B, C8, 72, 0A, 8B, C1, 59, 94, 8B, 00, 89, 04, 24, C3, 2D, 00, 10, 00, 00, 85, 00, EB, E9, 8B, FF, 55, 8B, EC, 53, 8B, 5D, 08, 83, FB, E0, 77, 6F, 56, 57, 83, 3D, 3C, 4E, 3A, 00, 00, 75, 18, E8, F5, 2E, 00, 00, 6A, 1E, E8, 3F, 2D, 00, 00, 68, FF, 00, 00, 00, E8, 37, F3, FF, FF, 59, 59, 85, DB, 74, 04, 8B, C3, EB, 03, 33, C0, 40, 50, 6A, 00, FF, 35, 3C, 4E, 3A...
 
[+]

Entropy:
7.6141

Code size:
100.5 KB (102,912 bytes)

The file downloadfilesetup__2299_i1186035627_il3.exe has been seen being distributed by the following URL.

Remove downloadfilesetup__2299_i1186035627_il3.exe - Powered by Reason Core Security