flashplayer__4369_i1104313251_il5.exe

The application flashplayer__4369_i1104313251_il5.exe has been detected as a potentially unwanted program by 28 anti-malware scanners. It bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install. The file has been seen being downloaded from www.more-files.com and multiple other hosts.
Version:
1.1.6.20

MD5:
c2bbd0015946803aa16c4aa60f1173cf

SHA-1:
4b4418421ae87ad021284b4684e00b1f14e43042

SHA-256:
3d62dc5a46af0d07b6f3c64bfaa8d595729a4b8e483f1bde4e25b97582d023d3

Scanner detections:
28 / 68

Status:
Potentially unwanted

Analysis date:
12/25/2024 4:52:36 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Application.Bundler.Amonetize.14
713

AegisLab AV Signature
Troj.W32.Menti
2.1.4+

Agnitum Outpost
PUA.Amonetize
7.1.1

AhnLab V3 Security
PUP/Win32.Amonetiz
2014.10.20

Avira AntiVirus
ADWARE/Adware.Gen2
7.11.179.140

avast!
Win32:Rootkit-gen [Rtk]
2014.9-150222

Baidu Antivirus
Adware.Win32.Amonetize
4.0.3.15222

Bitdefender
Gen:Variant.Application.Bundler.Amonetize.14
1.0.20.265

Comodo Security
ApplicUnwnt
19849

Dr.Web
Adware.Downware.6605
9.0.1.053

ESET NOD32
Win32/Amonetize.AW (variant)
9.10586

Fortinet FortiGate
Riskware/Amonetize
2/22/2015

F-Prot
W32/Amonetize.A.gen
v6.4.7.1.166

F-Secure
Gen:Variant.Application.Bundler
11.2015-22-02_1

G Data
Gen:Variant.Application.Bundler.Amonetize.14
15.2.24

IKARUS anti.virus
Win32.SuspectCrc
t3scan.1.7.8.0

K7 AntiVirus
Trojan
13.184.13727

Malwarebytes
PUP.Optional.Amonetize
v2015.02.22.07

McAfee
RDN/Generic PUP.x!ckk
5600.6847

MicroWorld eScan
Gen:Variant.Application.Bundler.Amonetize.14
16.0.0.159

NANO AntiVirus
Riskware.Win32.Amonetize.dconht
0.28.2.62671

Qihoo 360 Security
HEUR/Malware.QVM10.Gen
1.0.0.1015

Reason Heuristics
Threat.Win.Reputation.IMP
15.2.22.7

Rising Antivirus
PE:Trojan.Win32.Generic.171B6FA0!387674016
23.00.65.15220

Sophos
Amonetize
4.98

Trend Micro House Call
TROJ_GEN.R0CBC0EH514
7.2.53

Trend Micro
TROJ_GEN.R0CBC0EH514
10.465.22

VIPRE Antivirus
Trojan.Win32.Generic
34066

File size:
340.5 KB (348,672 bytes)

Product version:
1.1.6.20

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\flashplayer__4369_i1104313251_il5.exe

File PE Metadata
Compilation timestamp:
7/30/2014 5:04:48 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
6144:l1B00gQFnQtNH0aKcgQNBFgqp3Bk7pF0qesAfzpw0HAXLquBdcFmK19hT:l1B00gQetNpKjQNBqqLk7VMwAAXLlBdi

Entry address:
0x29F14

Entry point:
E8, EF, 91, 00, 00, E9, 89, FE, FF, FF, CC, CC, 53, 56, 8B, 44, 24, 18, 0B, C0, 75, 18, 8B, 4C, 24, 14, 8B, 44, 24, 10, 33, D2, F7, F1, 8B, D8, 8B, 44, 24, 0C, F7, F1, 8B, D3, EB, 41, 8B, C8, 8B, 5C, 24, 14, 8B, 54, 24, 10, 8B, 44, 24, 0C, D1, E9, D1, DB, D1, EA, D1, D8, 0B, C9, 75, F4, F7, F3, 8B, F0, F7, 64, 24, 18, 8B, C8, 8B, 44, 24, 14, F7, E6, 03, D1, 72, 0E, 3B, 54, 24, 10, 77, 08, 72, 07, 3B, 44, 24, 0C, 76, 01, 4E, 33, D2, 8B, C6, 5E, 5B, C2, 10, 00, 57, 8B, C6, 83, E0, 0F, 85, C0, 0F, 85, C1, 00...
 
[+]

Entropy:
6.4671

Code size:
243 KB (248,832 bytes)

The file flashplayer__4369_i1104313251_il5.exe has been seen being distributed by the following 2 URLs.

http://www.more-files.com/alldd.html?myref=www.newhdplugin.org&version=1.1.6.20&prefix=FlashPlayerSetup&campid=4369&instid[appname]=FlashPlayer&instid[appsetupurl]=https://launchpad.net/lightspark/trunk/lightspark-0.5.3/ download/Lightspark-0.5.3-win32.exe&instid[appimageurl]=http://www.tsxnrey.com/i/White Smoke Inc/.../150x150_v1Logo.jpg&prefix=FlashPlayer&ti1=MjA0NXw0NjEyfEZSfDN8MXx8|f5f517258af1d637a3ab318c1f052021|3c77eb60-9daa-11e3-a424-0025b320a860&capp=FlashPlayer&AMt=1406677643495&AMh=7fn2b4gxIWmb09igS84d2Ie2zMXUjQgM3KAUfCzDKPbVydo5QZMSwcespsmVBC1AtdCH3iBb48loOaw3

Remove flashplayer__4369_i1104313251_il5.exe - Powered by Reason Core Security