flash player for game__3039_i1221995876_il533618.exe

Ukra-2006 LLC

This is the Amonetize download manager which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application flash player for game__3039_i1221995876_il533618.exe by Ukra-2006 has been detected as adware by 42 anti-malware scanners. The program is a setup application that uses the TUGUU DomaIQ Setup installer. The setup program bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install.
Publisher:
Ukra-2006 LLC  (signed and verified)

Version:
1.1.8.22

MD5:
475e6d2b4dd286db4540b00927bceaa8

SHA-1:
0ee0a86bf694f96fa83cb777a4df5521eec8f390

SHA-256:
c81300e6508c128162946eea344724d1a48b5054c78335721c45da52b54ca2bd

Scanner detections:
42 / 68

Status:
Adware

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
12/25/2024 1:58:14 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Application.Bundler.Amonetize.12
873

Agnitum Outpost
PUA.Amonetize
7.1.1

AhnLab V3 Security
PUP/Win32.Amonetize
2014.08.29

Avira AntiVirus
ADWARE/Adware.Gen
7.11.169.186

avast!
Win32:Amonetize-DI [PUP]
2014.9-140914

AVG
Ukra
2015.0.3351

Baidu Antivirus
Adware.Win32.Amonetize
4.0.3.14914

Bitdefender
Gen:Variant.Application.Bundler.Amonetize.12
1.0.20.1285

Dr.Web
Adware.Downware.8331
9.0.1.0257

ESET NOD32
Win32/Amonetize.BN (variant)
8.10331

Fortinet FortiGate
Riskware/Amonetize
9/14/2014

F-Secure
Gen:Variant.Application.Bundler
11.2014-14-09_1

G Data
Gen:Variant.Application.Bundler.Amonetize.12
14.9.24

IKARUS anti.virus
Win32.SuspectCrc
t3scan.1.7.5.0

Malwarebytes
PUP.Optional.Amonetize
v2014.09.14.09

McAfee
PUP-Amonetize
5600.7007

MicroWorld eScan
Gen:Variant.Application.Bundler.Amonetize.12
15.0.0.771

NANO AntiVirus
Riskware.Win32.Downware.degitz
0.28.2.61861

Panda Antivirus
Trj/Genetic.gen
14.09.14.09

Qihoo 360 Security
Win32/Application.c7d
1.0.0.1015

Reason Heuristics
PUP.Installer.Ukra2006.q
14.9.14.21

Sophos
Amonetize
4.98

Trend Micro House Call
Suspicious_GEN.F47V0826
7.2.257

VIPRE Antivirus
Trojan.Win32.Generic
32632

Zillya! Antivirus
Adware.Amonetize.Win32.883
2.0.0.1905

File size:
346.2 KB (354,512 bytes)

Product version:
1.1.8.22

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
TUGUU DomaIQ Setup

Language:
English (United States)

Common path:
C:\users\{user}\downloads\flash player for game__3039_i1221995876_il533618.exe

Digital Signature
Signed by:

Authority:
Thawte, Inc.

Valid from:
7/1/2014 2:00:00 AM

Valid to:
7/2/2015 1:59:59 AM

Subject:
CN=Ukra-2006 LLC, O=Ukra-2006 LLC, L=Kharkiv, S=Harkivska obl, C=UA

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
2B3200D1AF3CAC4253C00F000EF4BAB9

File PE Metadata
Compilation timestamp:
8/21/2014 9:06:30 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
6144:uq57Lfg8yZKdmvR3T8PqyOKqtyT3JyuGQi9BPo6xmXYdTUWfmGlh:uuuZKdm6XJGJ9BgWhdT1rh

Entry address:
0xB032

Entry point:
E8, 5F, 45, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 53, 8B, 5D, 08, 83, FB, E0, 77, 6F, 56, 57, 83, 3D, 3C, 9D, 3B, 00, 00, 75, 18, E8, 54, 2D, 00, 00, 6A, 1E, E8, 9E, 2B, 00, 00, 68, FF, 00, 00, 00, E8, D6, F8, FF, FF, 59, 59, 85, DB, 74, 04, 8B, C3, EB, 03, 33, C0, 40, 50, 6A, 00, FF, 35, 3C, 9D, 3B, 00, FF, 15, 14, 31, 3B, 00, 8B, F8, 85, FF, 75, 26, 6A, 0C, 5E, 39, 05, 40, 9D, 3B, 00, 74, 0D, 53, E8, 1D, 15, 00, 00, 59, 85, C0, 75, A9, EB, 07, E8, 3A, 24, 00, 00, 89, 30, E8, 33, 24, 00, 00, 89...
 
[+]

Code size:
70 KB (71,680 bytes)

The file flash player for game__3039_i1221995876_il533618.exe has been seen being distributed by the following URL.