install-flashplayer-12.0.0.78__4607_i917026392_il40.exe

The application install-flashplayer-12.0.0.78__4607_i917026392_il40.exe has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. It bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install. The file has been seen being downloaded from www.gofordownload.com.
MD5:
55d06cc2dfcaa81ea8ed94ab81fdc33c

SHA-1:
60045c65e5d9ab7b35f21e28db675dd64a3921b8

SHA-256:
871a89f1c6f4d0083a12d780f489cf976fc1042df0c35d64100a09f3da44bf05

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
12/25/2024 4:17:08 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Adware.Amonetize (M)
16.7.23.20

File size:
182 KB (186,370 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\install-flashplayer-12.0.0.78__4607_i917026392_il40.exe

File PE Metadata
Compilation timestamp:
6/20/2014 6:33:56 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
3072:YkCQNr7WK+FocFhwoZiG/O9G1qtmME8x0gDK5oe+t/Behrig4eBBBSQyFRgFr:YkCQBuhkqO9GAU/gDK2ht/Behrig4eB9

Entry address:
0x281E4

Entry point:
E8, 34, A0, 00, 00, E9, 89, FE, FF, FF, CC, CC, 53, 56, 8B, 44, 24, 18, 0B, C0, 75, 18, 8B, 4C, 24, 14, 8B, 44, 24, 10, 33, D2, F7, F1, 8B, D8, 8B, 44, 24, 0C, F7, F1, 8B, D3, EB, 41, 8B, C8, 8B, 5C, 24, 14, 8B, 54, 24, 10, 8B, 44, 24, 0C, D1, E9, D1, DB, D1, EA, D1, D8, 0B, C9, 75, F4, F7, F3, 8B, F0, F7, 64, 24, 18, 8B, C8, 8B, 44, 24, 14, F7, E6, 03, D1, 72, 0E, 3B, 54, 24, 10, 77, 08, 72, 07, 3B, 44, 24, 0C, 76, 01, 4E, 33, D2, 8B, C6, 5E, 5B, C2, 10, 00, 57, 8B, C6, 83, E0, 0F, 85, C0, 0F, 85, C1, 00...
 
[+]

Entropy:
6.4868

Code size:
237 KB (242,688 bytes)

The file install-flashplayer-12.0.0.78__4607_i917026392_il40.exe has been seen being distributed by the following URL.