fifa2016crackrazor1911100working__7934_il21257.exe

XCDPack

Tekhniks Resurs, TOV

The application fifa2016crackrazor1911100working__7934_il21257.exe, “NeedfullSoft XCD Pack” by Tekhniks Resurs, TOV has been detected as a potentially unwanted program by 3 anti-malware scanners. It bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install.
Publisher:
NeedfullSoft  (signed by Tekhniks Resurs, TOV)

Product:
XCDPack

Description:
NeedfullSoft XCD Pack

Version:
7.24.4.6

MD5:
be8373e03a84faa93fc2bde806065ffa

SHA-1:
6de07c8189de291739a2ac967c84863cd8d90977

SHA-256:
6db45422339e89cdb8fd6a59609915ef492eef7366fd0f9f576348879c4dc3c0

Scanner detections:
3 / 68

Status:
Potentially unwanted

Analysis date:
12/23/2024 4:19:37 AM UTC  (today)

Scan engine
Detection
Engine version

Dr.Web
Adware.Downware.15971, Trojan.Amonetize.13522
9.0.1.05190

ESET NOD32
Win32/Amonetize.VR potentially unwanted application
8.0.319.0

Reason Heuristics
PUP.Amonetize.Tekhniks (M)
16.7.18.16

File size:
857.7 KB (878,281 bytes)

Product version:
7.24.4.6

Original file name:
xcd.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\fifa2016crackrazor1911100working__7934_il21257.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
6/29/2016 12:00:00 AM

Valid to:
6/29/2017 11:59:59 PM

Subject:
CN="Tekhniks Resurs, TOV", OU=IT, O="Tekhniks Resurs, TOV", STREET="bul. Ivana Lepse, 4", L=Kyyiv, S=Kyyiv, PostalCode=03067, C=UA

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
4BDBA94B8C9A739276B632612DDCA129

File PE Metadata
Compilation timestamp:
7/16/2016 12:08:50 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
12288:xC0RkWQJFL06WlS+rp3Pp3qkgRHAujGL3l12adGb1On6185zkotE56KJSrs4uTd/:g+lQ+dskgG12R1O61UQAL4SrwTwO

Entry address:
0x361C

Entry point:
E8, A7, 22, 00, 00, E9, 39, FE, FF, FF, 55, 8B, EC, FF, 15, 70, 30, 42, 00, 6A, 01, A3, 2C, D7, 42, 00, E8, 53, 29, 00, 00, FF, 75, 08, E8, CE, 28, 00, 00, 83, 3D, 2C, D7, 42, 00, 00, 59, 59, 75, 08, 6A, 01, E8, 39, 29, 00, 00, 59, 68, 09, 04, 00, C0, E8, 9C, 28, 00, 00, 59, 5D, C3, 55, 8B, EC, 81, EC, 24, 03, 00, 00, 6A, 17, E8, 79, 78, 01, 00, 85, C0, 74, 05, 6A, 02, 59, CD, 29, A3, 10, D5, 42, 00, 89, 0D, 0C, D5, 42, 00, 89, 15, 08, D5, 42, 00, 89, 1D, 04, D5, 42, 00, 89, 35, 00, D5, 42, 00, 89, 3D, FC...
 
[+]

Code size:
135 KB (138,240 bytes)