flashplayersetup__6595_i644404602_il9.exe

The application flashplayersetup__6595_i644404602_il9.exe has been detected as a potentially unwanted program by 3 anti-malware scanners. This is a setup program which is used to install the application. The setup program bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install. The file has been seen being downloaded from www.holddownload.com.
MD5:
464d152ddd6ce08350bb3b01fca6ffe1

SHA-1:
da40dd0db4670fcbbcf3913aec3735f3c084450f

SHA-256:
5c4647c8509cdf71bbb440fcc6ff8ae4ff5b7678b903bd7c5af037def3d50f7b

Scanner detections:
3 / 68

Status:
Potentially unwanted

Analysis date:
12/25/2024 1:01:56 AM UTC  (today)

Scan engine
Detection
Engine version

avast!
Win32:Amonetize-AX [PUP]
160414-2

AVG
Adware Generic_r.OM
2015.0.4604

Reason Heuristics
Adware.Amonetize.AT (M)
16.7.18.8

File size:
233.2 KB (238,831 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\flashplayersetup__6595_i644404602_il9.exe

File PE Metadata
Compilation timestamp:
5/7/2014 6:01:49 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
6144:V7PF5djiUiTu/RMYEeIHT7ABNZbQjW6e3P0MtKypVDSoNRaqui1:V7PF5deUi+MYEeIHT7oNZyY0KKyLSORh

Entry address:
0x282B1

Entry point:
E8, AB, 9F, 00, 00, E9, 89, FE, FF, FF, CC, CC, CC, CC, CC, 53, 56, 8B, 44, 24, 18, 0B, C0, 75, 18, 8B, 4C, 24, 14, 8B, 44, 24, 10, 33, D2, F7, F1, 8B, D8, 8B, 44, 24, 0C, F7, F1, 8B, D3, EB, 41, 8B, C8, 8B, 5C, 24, 14, 8B, 54, 24, 10, 8B, 44, 24, 0C, D1, E9, D1, DB, D1, EA, D1, D8, 0B, C9, 75, F4, F7, F3, 8B, F0, F7, 64, 24, 18, 8B, C8, 8B, 44, 24, 14, F7, E6, 03, D1, 72, 0E, 3B, 54, 24, 10, 77, 08, 72, 07, 3B, 44, 24, 0C, 76, 01, 4E, 33, D2, 8B, C6, 5E, 5B, C2, 10, 00, 57, 8B, C6, 83, E0, 0F, 85, C0, 0F...
 
[+]

Code size:
237 KB (242,688 bytes)

The file flashplayersetup__6595_i644404602_il9.exe has been seen being distributed by the following URL.

Remove flashplayersetup__6595_i644404602_il9.exe - Powered by Reason Core Security