dungeons202620dragons203e...apdf2a.exe

Asper

Maxiget Limited

This is a bundle installer which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application dungeons202620dragons203e...apdf2a.exe by Maxiget Limited has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the New IT Desktop Setup installer. The file has been seen being downloaded from files-download-37.com.
Publisher:
C Vital  (signed by Maxiget Limited)

Product:
Asper

Description:
LeaveLoadLoud

Version:
4, 10, 16, 0

MD5:
2b940c89ed8d2082d1feeb0c7dd933ae

SHA-1:
73948d00f844bfeec4adbccac61266b3b71b9f4d

SHA-256:
94a69cd48fb5f8d281224468acfa8c7d42485260f62eea9e5aedddb27651582b

Scanner detections:
1 / 68

Status:
Adware

Explanation:
This is a modified installer version of the software and bundles additional offers including adware.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
11/23/2024 2:59:01 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.New IT Limited (M)
16.8.1.13

File size:
58.3 KB (59,696 bytes)

Product version:
4, 10, 16, 0

Copyright:
Conical (c)

Trademarks:
TM2-15

Original file name:
lltmoping.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
New IT Desktop Setup

Common path:
C:\users\{user}\downloads\dungeons202620dragons203e...apdf2a.exe

Digital Signature
Signed by:

Authority:
GoDaddy.com, Inc.

Valid from:
12/11/2014 1:36:00 PM

Valid to:
8/15/2016 8:41:32 AM

Subject:
CN=Maxiget Limited, O=Maxiget Limited, L=Limassol, S=Cyprus, C=CY

Issuer:
CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US

Serial number:
2B83CBF523FA3B

File PE Metadata
Compilation timestamp:
1/22/2015 4:15:38 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
768:eaFfLWUIBO0PYBYDuOJtppaBtGUQGREbwUiGI2xWfFysCDfeD19R:jyUI30auOJFYnQaEbb22xWfF2yF

Entry address:
0x438B

Entry point:
55, 8B, EC, 83, EC, 44, 56, FF, 15, 54, 50, 40, 00, 8B, F0, 8A, 06, 3C, 22, 74, 10, 3C, 20, 7E, 1E, 46, 80, 3E, 20, 7F, FA, EB, 16, 3C, 22, 74, 11, 46, 8A, 06, 84, C0, 75, F5, 3C, 22, 75, 07, EB, 04, 3C, 20, 7F, 07, 46, 8A, 06, 84, C0, 75, F5, 83, 65, E8, 00, 8D, 45, BC, 50, FF, 15, 30, 50, 40, 00, E8, 5B, 00, 00, 00, 68, 04, 70, 40, 00, 68, 00, 70, 40, 00, E8, 32, 00, 00, 00, F6, 45, E8, 01, 59, 59, 74, 06, 0F, B7, 45, EC, EB, 03, 6A, 0A, 58, 50, 56, 6A, 00, 6A, 00, FF, 15, 2C, 50, 40, 00, 50, E8, 93, FB...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
13.5 KB (13,824 bytes)

The file dungeons202620dragons203e...apdf2a.exe has been seen being distributed by the following URL.

Remove dungeons202620dragons203e...apdf2a.exe - Powered by Reason Core Security