flashplayer__4369_i1184440635_il10.exe

The application flashplayer__4369_i1184440635_il10.exe has been detected as a potentially unwanted program by 32 anti-malware scanners. This is a setup program which is used to install the application. The setup program bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install. The file has been seen being downloaded from www.transdownload.com a known adware distribution point operated by Amonetize ltd..
Version:
1.1.6.20

MD5:
6c426a9973da3bd5bcf81abfb9d7dd37

SHA-1:
e194ab901af59789e83a859b89ff6a615cc5f251

SHA-256:
22ae4ae3a9e7c340c33312ea27b7afa5da63cfef51da01dbcc7bf28ecbe61c50

Scanner detections:
32 / 68

Status:
Potentially unwanted

Analysis date:
12/24/2024 12:31:26 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Application.Bundler.Amonetize.12
554

Agnitum Outpost
PUA.Amonetize
7.1.1

AhnLab V3 Security
PUP/Win32.Amonetize
2015.07.23

Avira AntiVirus
ADWARE/Adware.Gen
8.3.1.6

Arcabit
Trojan.Application.Bundler.Amonetize.12
1.0.0.425

avast!
Win32:Amonetize-DK [PUP]
2014.9-150730

AVG
Generic_r
2016.0.3032

Baidu Antivirus
Adware.Win32.Dropper
4.0.3.15730

Bitdefender
Gen:Variant.Application.Bundler.Amonetize.12
1.0.20.1055

Bkav FE
HW32.Packed
1.3.0.6979

Comodo Security
ApplicUnwnt
22846

Dr.Web
Adware.Downware.8012
9.0.1.0211

ESET NOD32
Win32/Amonetize.BM potentially unwanted (variant)
9.11983

Fortinet FortiGate
W32/Agent.BM!tr
7/30/2015

F-Prot
W32/A-60929806
v6.4.7.1.166

F-Secure
Gen:Variant.Application.Bundler
11.2015-30-07_5

G Data
Gen:Variant.Application.Bundler.Amonetize.12
15.7.25

K7 AntiVirus
Trojan
13.207.16653

Kaspersky
not-a-virus:AdWare.Win32.Amonetize
14.0.0.1655

McAfee
PUP-Amonetize
5600.6688

MicroWorld eScan
Gen:Variant.Application.Bundler.Amonetize.12
16.0.0.633

NANO AntiVirus
Riskware.Win32.Amonetize.ddtnan
0.30.24.2668

Panda Antivirus
Trj/Genetic.gen
15.07.30.10

Qihoo 360 Security
Win32/Application.c7d
1.0.0.1015

Quick Heal
Trojan.Neop.G5
7.15.14.00

Reason Heuristics
Threat.Win.Reputation.IMP
15.7.30.22

Rising Antivirus
PE:Trojan.Win32.Generic.1731A4F4!389129460
23.00.65.15728

Trend Micro House Call
TROJ_SPNR.28HN14
7.2.211

Trend Micro
TROJ_SPNR.28HN14
10.465.30

Vba32 AntiVirus
AdWare.Amonetize
3.12.26.4

VIPRE Antivirus
Trojan.Win32.Generic
42254

Zillya! Antivirus
Adware.Amonetize.Win32.722
2.0.0.2309

File size:
443 KB (453,632 bytes)

Product version:
1.1.6.20

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\flashplayer__4369_i1184440635_il10.exe

File PE Metadata
Compilation timestamp:
8/8/2014 7:44:44 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
6144:6VFfnQdPbJWDkTB0qQWNkIEeT7Fo8NcPFLMCZu07qsZEZ68FIFCbdyDn:6VV0zJWDkTYIEWqWENBZi6Vcbu

Entry address:
0x10FBF

Entry point:
E8, E2, 56, 00, 00, E9, 89, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, 51, 8D, 4C, 24, 04, 2B, C8, 1B, C0, F7, D0, 23, C8, 8B, C4, 25, 00, F0, FF, FF, 3B, C8, 72, 0A, 8B, C1, 59, 94, 8B, 00, 89, 04, 24, C3, 2D, 00, 10, 00, 00, 85, 00, EB, E9, 8B, FF, 55, 8B, EC, 53, 8B, 5D, 08, 83, FB, E0, 77, 6F, 56, 57, 83, 3D, 3C, 4E, 3A, 00, 00, 75, 18, E8, F5, 2E, 00, 00, 6A, 1E, E8, 3F, 2D, 00, 00, 68, FF, 00, 00, 00, E8, 37, F3, FF, FF, 59, 59, 85, DB, 74, 04, 8B, C3, EB, 03, 33, C0, 40, 50, 6A, 00, FF, 35, 3C, 4E, 3A...
 
[+]

Entropy:
7.6184

Code size:
100.5 KB (102,912 bytes)

The file flashplayer__4369_i1184440635_il10.exe has been seen being distributed by the following URL.

Remove flashplayer__4369_i1184440635_il10.exe - Powered by Reason Core Security