icloud activation ios downloader__3687_i611888659_il8878151.exe

The application icloud activation ios downloader__3687_i611888659_il8878151.exe has been detected as a potentially unwanted program by 20 anti-malware scanners. This is a setup program which is used to install the application. The setup program bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install. The file has been seen being downloaded from www.constantlydownload.com.
Version:
1.1.5.26

MD5:
2843ec8603c53f1e94904bc5aaa8398e

SHA-1:
386a468ee1cdf9ed8f78083e2c53dbc4111c327b

SHA-256:
aa3006965c2886e7f3cf969d9d90aaf90f47577a1ad7c5f80fe6edb961a2b60f

Scanner detections:
20 / 68

Status:
Potentially unwanted

Analysis date:
11/30/2024 10:49:27 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.Generic.11241702
1010

AhnLab V3 Security
PUP/Win32.Amonetiz
14.04.29

Avira AntiVirus
ADWARE/Adware.Gen2
7.11.146.2

avast!
Win32:Amonetize-AX [PUP]
2014.9-140429

Baidu Antivirus
Adware.Win32.Amonetize
4.0.3.14429

Bitdefender
Trojan.Generic.11241702
1.0.20.600

Emsisoft Anti-Malware
Trojan.Generic.11241702
8.14.04.30.09

ESET NOD32
Win32/Amonetize.AJ (variant)
8.9734

G Data
Trojan.Generic.11241702
14.4.24

K7 AntiVirus
Trojan
13.177.11922

Malwarebytes
PUP.Optional.Amonetize.A
v2014.04.29.09

McAfee
Artemis!2843EC8603C5
5600.7145

MicroWorld eScan
Trojan.Generic.11241702
15.0.0.360

nProtect
Trojan.Generic.11241702
14.04.29.01

Qihoo 360 Security
Win32/Trojan.Multi.daf
1.0.0.1015

Reason Heuristics
Threat.Win.Reputation.IMP
14.4.30.21

Rising Antivirus
PE:Malware.Adware!6.1890
23.00.65.14427

Sophos
Amonetize
4.98

Trend Micro House Call
TROJ_GEN.F47V0427
7.2.120

VIPRE Antivirus
Amonetize
28688

File size:
343.5 KB (351,744 bytes)

Product version:
1.1.5.26

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\icloud activation ios downloader__3687_i611888659_il8878151.exe

File PE Metadata
Compilation timestamp:
4/28/2014 6:00:32 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
6144:06n6ATlfmdYc0rEu9XDwscrM5K/IBtAd8zPSeYe5Y2HoKb+ORXyXpfnIBNkLEC2x:06n6qlfUYc0x9XDwscrM5KotAl8Ke3NJ

Entry address:
0x29D11

Entry point:
E8, 99, 9F, 00, 00, E9, 89, FE, FF, FF, CC, CC, CC, CC, CC, 53, 56, 8B, 44, 24, 18, 0B, C0, 75, 18, 8B, 4C, 24, 14, 8B, 44, 24, 10, 33, D2, F7, F1, 8B, D8, 8B, 44, 24, 0C, F7, F1, 8B, D3, EB, 41, 8B, C8, 8B, 5C, 24, 14, 8B, 54, 24, 10, 8B, 44, 24, 0C, D1, E9, D1, DB, D1, EA, D1, D8, 0B, C9, 75, F4, F7, F3, 8B, F0, F7, 64, 24, 18, 8B, C8, 8B, 44, 24, 14, F7, E6, 03, D1, 72, 0E, 3B, 54, 24, 10, 77, 08, 72, 07, 3B, 44, 24, 0C, 76, 01, 4E, 33, D2, 8B, C6, 5E, 5B, C2, 10, 00, 57, 8B, C6, 83, E0, 0F, 85, C0, 0F...
 
[+]

Code size:
245 KB (250,880 bytes)

The file icloud activation ios downloader__3687_i611888659_il8878151.exe has been seen being distributed by the following URL.