lvddo5swcwdqcdwirs2ejoxcjlsm_cr.exe

The application lvddo5swcwdqcdwirs2ejoxcjlsm_cr.exe, “Download da Internet” has been detected as a potentially unwanted program by 34 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer, however the file is not signed with an authenticode signature from a trusted source. The file has been seen being downloaded from ticketdown.me.
Description:
Download da Internet

Version:
6.9.8.3

MD5:
519a93b69b9e4179fa64e8e337a7b816

SHA-1:
b87e2674eb0a9fdfe168f6a3b6f56244835699cd

SHA-256:
b3190ab69d8d50e4d079afc0f479c6610526821b2a6921008688372b79597d6c

Scanner detections:
34 / 68

Status:
Potentially unwanted

Analysis date:
1/13/2025 7:37:19 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Dropped:Adware.Agent.PPG
5813571

Agnitum Outpost
PUA.BrAppWare
7.1.1

Avira AntiVirus
ADWARE/Adware.Gen
8.3.2.4

Arcabit
Adware.Agent.PPG
1.0.0.637

avast!
Win32:Adware-gen [Adw]
160111-0

AVG
Adware Generic6.TGA
2015.0.4489

Baidu Antivirus
Hacktool.Win64.NetFilter
4.0.3.16111

Bitdefender
Dropped:Adware.Agent.PPG
1.0.20.55

Clam AntiVirus
Win.Trojan.14501195
0.98/21247

Dr.Web
infected with Trojan.Fraudster.1620
9.0.1.05190

Emsisoft Anti-Malware
Dropped:Adware.Agent.PPG
16.01.11

ESET NOD32
multiple threats
7.0.302.0

Fortinet FortiGate
Riskware/NetFilter
1/11/2016

F-Prot
W32/Adware.ALMA (exact, not disinfectable)
4.6.5.141

F-Secure
Adware.Agent.PPG
11.2016-11-01_2

G Data
Dropped:Adware.Agent.PPG
16.1.25

IKARUS anti.virus
PUA.BrAppWare
t3scan.1.9.5.0

K7 AntiVirus
Adware
13.212.18302

Kaspersky
not-a-virus:NetTool.Win64.NetFilter
15.0.0.562

Malwarebytes
PUP.Optional.BRApp
v2016.01.11.04

McAfee
Program.Artemis!519A93B69B9E
18.0.204.0

Microsoft Security Essentials
Threat.Undefined
1.213.2487.0

MicroWorld eScan
Dropped:Adware.Agent.PPG
17.0.0.33

NANO AntiVirus
Trojan.Win64.Fraudster.dvddue
1.0.14.5380

Norman
Dropped:Adware.Agent.PPG
09.01.2016 19:09:24

nProtect
Dropped:Adware.Agent.PPG
15.12.31.01

Panda Antivirus
Trj/CI.A
16.01.11.04

Quick Heal
Trojan.Nurjax.A8
1.16.14.00

Rising Antivirus
PE:Malware.Generic(Thunder)!1.A1C4 [F]
23.00.65.16109

Sophos
PUA 'NetFilter' (of type Adware)
5.22

Total Defense
Heur/TrojanHorse.ZCLA!suspicious
37.1.62.1

Trend Micro
TROJ_GE.7FD2C1AB
10.465.11

VIPRE Antivirus
Trojan.Win32.Generic
46230

Zillya! Antivirus
Adware.BrAppWare.Win32.16
2.0.0.2591

File size:
1.2 MB (1,227,479 bytes)

Original file name:
n63TJ3LpBh5uGoyL

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\lvddo5swcwdqcdwirs2ejoxcjlsm_cr.exe

File PE Metadata
Compilation timestamp:
12/5/2009 7:50:46 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
24576:MzzMiLaZYfjUTnd34rrkFVJVWQ1AjPXRBwKl6kOBwZqc+S+3QMD7:QzMcaZYjUTdoPkFV2Qwl69cqc+SnMD7

Entry address:
0x323C

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 30, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B4, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 58, 3F, 42, 00, E8, 09, 2C, 00, 00, A3, A4, 3E, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 58, F4, 41, 00, FF, 15, 58, 71, 40, 00, 68, B8, 91, 40, 00, 68, A0, 36, 42, 00, E8, BC, 28, 00, 00, FF, 15, B0, 70, 40, 00, BF, 00, 90, 42, 00, 50, 57, E8, AA, 28, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The file lvddo5swcwdqcdwirs2ejoxcjlsm_cr.exe has been seen being distributed by the following URL.

Remove lvddo5swcwdqcdwirs2ejoxcjlsm_cr.exe - Powered by Reason Core Security