mobile-intel-r-965-express-chipset-family-driver.exe

Downloader

DownloadAtoZ

The application mobile-intel-r-965-express-chipset-family-driver.exe has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. This is a setup program which is used to install the application. The file has been seen being downloaded from drivers.downloadatoz.com.
Publisher:
DownloadAtoZ

Product:
Downloader

Version:
1.0.0.1

MD5:
8a8fb464bb68feb1d8036254d7921040

SHA-1:
4177583da5e6a981564c8481291e8623c24133c4

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
11/27/2024 8:54:24 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.DownloadAtoZ.Bundler (M)
16.7.21.14

File size:
1.3 MB (1,341,952 bytes)

Product version:
1.0.0.1

Copyright:
DownloadAtoZ All rights reserved.

Original file name:
Downloader.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\documents and settings\lidka\moje dokumenty\downloads\mobile-intel-r-965-express-chipset-family-driver.exe

File PE Metadata
Compilation timestamp:
8/30/2014 2:09:32 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
12288:be3ImbRcbmn5xYvY5lrQdSqWe3bjyWqeis/dN:MZ5SqhtqWeLqeisl

Entry address:
0x325D9

Entry point:
E8, 1B, 72, 00, 00, E9, 79, FE, FF, FF, 3B, 0D, E0, F7, 45, 00, 75, 02, F3, C3, E9, 9D, 72, 00, 00, 8B, FF, 51, C7, 01, 8C, 07, 45, 00, E8, 95, 73, 00, 00, 59, C3, 8B, FF, 55, 8B, EC, 56, 8B, F1, E8, E3, FF, FF, FF, F6, 45, 08, 01, 74, 07, 56, E8, EB, FD, FD, FF, 59, 8B, C6, 5E, 5D, C2, 04, 00, 8B, FF, 55, 8B, EC, 8B, 45, 08, 83, C1, 09, 51, 83, C0, 09, 50, E8, D8, 73, 00, 00, F7, D8, 59, 1B, C0, 59, 40, 5D, C2, 04, 00, 8B, FF, 55, 8B, EC, 83, EC, 20, 53, 33, DB, 39, 5D, 14, 75, 20, E8, 77, 1E, 00, 00, 53...
 
[+]

Code size:
297.5 KB (304,640 bytes)

The file mobile-intel-r-965-express-chipset-family-driver.exe has been seen being distributed by the following URL.