icloudactivationlockbypass2016__7934_il50223.exe

Old Trafford viewer

IT systems

The application icloudactivationlockbypass2016__7934_il50223.exe, “Old Trafford Stadium” by IT systems has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. This is a setup program which is used to install the application. It bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install.
Publisher:
Old Trafford  (signed by IT systems)

Product:
Old Trafford viewer

Description:
Old Trafford Stadium

Version:
1.725.0.0

MD5:
294f77245e3a24771ed17ff83314e36b

SHA-1:
2988e22e0a7f15de6975365a6f52cd6ed7d8b96b

SHA-256:
dbae2887c7377c6943f21b13cbaffef6ffad93346e92b85e95c257eb38852a9d

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
12/22/2024 8:07:31 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Amonetize.ITsystem (M)
16.3.2.21

File size:
835.2 KB (855,226 bytes)

Product version:
1.725.0.0

Copyright:
Old Trafford TM

Original file name:
lz.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\microsoft\windows\temporary internet files\content.ie5\{random}\icloudactivationlockbypass2016__7934_il50223.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
2/26/2016 12:00:00 AM

Valid to:
2/25/2017 11:59:59 PM

Subject:
CN="""IT systems""", OU=IT, O="""IT systems""", STREET="street Henri Barbusse, 9-A", L=Kiev, S=Kiev, PostalCode=03150, C=UA

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
7E798AE8057B1CCD5DFB79BBF8B58019

File PE Metadata
Compilation timestamp:
2/29/2016 3:16:07 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:H/BM8TrJKTjTpDIYvOpK+bO34+c6dNH4mxTmgamVMZ7K5SvKix22lmVRDnaO:C8PJWXBtvOpKR40eaP+KiY2aRDnaO

Entry address:
0xACB1

Entry point:
E8, C9, 33, 00, 00, E9, 89, FE, FF, FF, CC, CC, CC, CC, CC, 51, 8D, 4C, 24, 04, 2B, C8, 1B, C0, F7, D0, 23, C8, 8B, C4, 25, 00, F0, FF, FF, 3B, C8, 72, 0A, 8B, C1, 59, 94, 8B, 00, 89, 04, 24, C3, 2D, 00, 10, 00, 00, 85, 00, EB, E9, 8B, FF, 55, 8B, EC, 83, 7D, 08, 00, 74, 2D, FF, 75, 08, 6A, 00, FF, 35, 08, 58, 41, 00, FF, 15, 20, 00, 41, 00, 85, C0, 75, 18, 56, E8, 6D, 21, 00, 00, 8B, F0, FF, 15, 1C, 00, 41, 00, 50, E8, 1D, 21, 00, 00, 59, 89, 06, 5E, 5D, C3, 8B, FF, 55, 8B, EC, 51, 53, 56, 8B, 35, 28, 00...
 
[+]

Code size:
60 KB (61,440 bytes)

The file icloudactivationlockbypass2016__7934_il50223.exe has been seen being distributed by the following URL.