flashplayersetup__2583_i723798378_il1.exe

The application flashplayersetup__2583_i723798378_il1.exe has been detected as a potentially unwanted program by 31 anti-malware scanners. This is a setup program which is used to install the application. The setup program bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install. The file has been seen being downloaded from clkmon.com and multiple other hosts.
Version:
1.1.5.89

MD5:
285eb5fc38afc71f1132305e29e743e5

SHA-1:
42b6596c8b6a19cf5cf8a86be776c8c553b713ff

SHA-256:
c86bab438cdfec276fff106502167a87ef887ebf0f5f8ec6be263bcdf43508fa

Scanner detections:
31 / 68

Status:
Potentially unwanted

Analysis date:
12/25/2024 5:13:47 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.Generic.947117
899

Agnitum Outpost
PUA.Amonetize
7.1.1

AhnLab V3 Security
PUP/Win32.Amonetiz
2014.08.11

Avira AntiVirus
ADWARE/Adware.Gen2
7.11.166.100

avast!
Win32:Amonetize-BJ [PUP]
2014.9-140819

AVG
Generic_r
2015.0.3377

Baidu Antivirus
Adware.Win32.Amonetize
4.0.3.14819

Bitdefender
Adware.Generic.947117
1.0.20.1155

Comodo Security
ApplicUnwnt
19146

Dr.Web
Adware.Downware.3925
9.0.1.0231

Emsisoft Anti-Malware
Adware.Generic.947117
8.14.08.19.10

ESET NOD32
Win32/Amonetize.AS (variant)
8.10232

Fortinet FortiGate
Riskware/Amonetize
8/19/2014

F-Prot
W32/Amonetize.A.gen
v6.4.7.1.166

F-Secure
Adware.Generic.947117
11.2014-19-08_3

G Data
Adware.Generic.947117
14.8.24

IKARUS anti.virus
PUA.Downloader
t3scan.1.6.1.0

K7 AntiVirus
Trojan
13.183.12998

Kaspersky
not-a-virus:HEUR:AdWare.Win32.Amonetize
14.0.0.3380

Malwarebytes
PUP.Optional.Monetizer
v2014.08.19.10

McAfee
RDN/Generic PUP.x!c2b
5600.7033

MicroWorld eScan
Adware.Generic.947117
15.0.0.693

NANO AntiVirus
Riskware.Win32.Amonetize.czmmii
0.28.2.61349

Panda Antivirus
Trj/CI.A
14.08.19.10

Qihoo 360 Security
Win32/Virus.Adware.932
1.0.0.1015

Reason Heuristics
Threat.Win.Reputation.IMP
14.8.19.22

Rising Antivirus
PE:Malware.Adware!6.1574
23.00.65.14817

Sophos
Amonetize
4.98

Trend Micro House Call
TROJ_GEN.R0CBC0EG214
7.2.231

Trend Micro
TROJ_GEN.R0CBC0EG214
10.465.19

VIPRE Antivirus
Amonetize
32094

File size:
324.5 KB (332,288 bytes)

Product version:
1.1.5.89

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\flashplayersetup__2583_i723798378_il1.exe

File PE Metadata
Compilation timestamp:
5/24/2014 6:03:09 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
6144:gQW4Jsrdo3Q8jeXc3Ofo/9nnxSB4ZqwRmBe4nAbqjM/d9h1+JT77vnaoBJMQ:gQW4JsW3Q8jyo1xi4Zym4Ml9hMa8JMQ

Entry address:
0x28084

Entry point:
E8, F7, 92, 00, 00, E9, 89, FE, FF, FF, CC, CC, 53, 56, 8B, 44, 24, 18, 0B, C0, 75, 18, 8B, 4C, 24, 14, 8B, 44, 24, 10, 33, D2, F7, F1, 8B, D8, 8B, 44, 24, 0C, F7, F1, 8B, D3, EB, 41, 8B, C8, 8B, 5C, 24, 14, 8B, 54, 24, 10, 8B, 44, 24, 0C, D1, E9, D1, DB, D1, EA, D1, D8, 0B, C9, 75, F4, F7, F3, 8B, F0, F7, 64, 24, 18, 8B, C8, 8B, 44, 24, 14, F7, E6, 03, D1, 72, 0E, 3B, 54, 24, 10, 77, 08, 72, 07, 3B, 44, 24, 0C, 76, 01, 4E, 33, D2, 8B, C6, 5E, 5B, C2, 10, 00, 57, 8B, C6, 83, E0, 0F, 85, C0, 0F, 85, C1, 00...
 
[+]

Code size:
230 KB (235,520 bytes)

The file flashplayersetup__2583_i723798378_il1.exe has been seen being distributed by the following 5 URLs.

http://clkmon.com/.../banners?action=r&pid=8945&cid=[siteID]

http://clkrev.com/adServe/adClick?ai=R5PVtLqh s4HAhFkCOzQdCgkHOYlJJ95E54aKyyCv9jEMzXPAmCD8bFumYIk 7Ih/JkjF5qUz3fp 50OHRpLUr7V69ee8VN9rRgH8zrXU0z8OtBbsVIhA9lYqv9I5AGe1M86h4A8TlYOmvm/.../1yuFXe 8mR4NYQC3LdPUxYh1VWgO9cqyW&src=BANNER

Remove flashplayersetup__2583_i723798378_il1.exe - Powered by Reason Core Security