flashplayer__4369_i493920967_il15.exe

The application flashplayer__4369_i493920967_il15.exe has been detected as a potentially unwanted program by 28 anti-malware scanners. It bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install. The file has been seen being downloaded from www.installpath.com.
Version:
1.1.5.55

MD5:
2a2ba86c883e4d3347b94fed9bb5dee1

SHA-1:
94e557cc0f4c97002b1902ba0745c6026010ab1a

SHA-256:
cc110f685626b2935930c73e0c02373a426cd393e73e58f9ce1dc591b7faddb2

Scanner detections:
28 / 68

Status:
Potentially unwanted

Analysis date:
12/25/2024 1:58:00 AM UTC  (today)

Scan engine
Detection
Engine version

AegisLab AV Signature
Adware.W32.Amonetize!c
2.1.4+

AhnLab V3 Security
PUP/Win32.Amonetiz.R95935
3.7.4.14

Avira AntiVirus
ADWARE/Adware.Gen2
8.3.3.4

Arcabit
Application.Imonetize.1
1.0.0.741

avast!
Win32:Amonetize-AE [PUP]
2014.9-160719

AVG
BundleApp
2017.0.2678

Baidu Antivirus
Win32.Trojan.WisdomEyes.151026.9950
4.0.3.16719

Bitdefender
Gen:Application.Imonetize.1
1.0.20.1005

Comodo Security
ApplicUnwnt
25367

ESET NOD32
Win32/Amonetize.AJ potentially unwanted (variant)
10.13734

Fortinet FortiGate
Riskware/Amonetize
7/19/2016

F-Prot
W32/Amonetize.A.gen
v6.4.7.1.166

F-Secure
Gen:Application.Imonetize.1
11.2016-19-07_3

G Data
Gen:Application.Imonetize
16.7.25

IKARUS anti.virus
Trojan.SuspectCRC
t3scan.2.1.6.0

K7 AntiVirus
Adware
13.231.20098

Kaspersky
not-a-virus:HEUR:AdWare.Win32.Amonetize
14.0.0.-117

Malwarebytes
PUP.Optional.Amonetize
v2016.07.19.11

McAfee
PUP-FBM
5600.6334

NANO AntiVirus
Riskware.Win32.Amonetize.dvvjnc
1.0.38.8984

Panda Antivirus
Trj/Genetic.gen
16.07.19.11

Qihoo 360 Security
Win32/Virus.Adware.932
1.0.0.1120

Quick Heal
PUA.Amonetize.A5
7.16.14.00

Reason Heuristics
Adware.Amonetize.ET (M)
16.7.19.11

Sophos
Amonetize (PUA)
4.98

SUPERAntiSpyware
PUP.Amonetize/Variant
9012

VIPRE Antivirus
Amonetize
50514

Zillya! Antivirus
Adware.Somoto.Win32.596
2.0.0.2937

File size:
326.5 KB (334,336 bytes)

Product version:
1.1.5.55

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\flashplayer__4369_i493920967_il15.exe

File PE Metadata
Compilation timestamp:
3/27/2014 8:31:51 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
6144:J8M2W2KrxDbSoT9qUz1BcqH3WAVeNwK9/PjLfHedJnyrFcoJLt3lgBHZ:J8M2WPxD5hqUzfcqtTcDLf+dJnyrFZJ2

Entry address:
0x27E81

Entry point:
E8, 60, 8D, 00, 00, E9, 89, FE, FF, FF, CC, CC, CC, CC, CC, 53, 56, 8B, 44, 24, 18, 0B, C0, 75, 18, 8B, 4C, 24, 14, 8B, 44, 24, 10, 33, D2, F7, F1, 8B, D8, 8B, 44, 24, 0C, F7, F1, 8B, D3, EB, 41, 8B, C8, 8B, 5C, 24, 14, 8B, 54, 24, 10, 8B, 44, 24, 0C, D1, E9, D1, DB, D1, EA, D1, D8, 0B, C9, 75, F4, F7, F3, 8B, F0, F7, 64, 24, 18, 8B, C8, 8B, 44, 24, 14, F7, E6, 03, D1, 72, 0E, 3B, 54, 24, 10, 77, 08, 72, 07, 3B, 44, 24, 0C, 76, 01, 4E, 33, D2, 8B, C6, 5E, 5B, C2, 10, 00, 57, 8B, C6, 83, E0, 0F, 85, C0, 0F...
 
[+]

Entropy:
6.4373

Code size:
232 KB (237,568 bytes)

The file flashplayer__4369_i493920967_il15.exe has been seen being distributed by the following URL.

Remove flashplayer__4369_i493920967_il15.exe - Powered by Reason Core Security