pes.2011.full__7816_i1621986503_il1052368.exe

LLC `FOTO-TSENTR `

The application pes.2011.full__7816_i1621986503_il1052368.exe by LLC `FOTO-TSENTR ` has been detected as a potentially unwanted program by 3 anti-malware scanners. It bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install. While running, it connects to the Internet address server-205-251-251-114.jfk5.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
LLC `FOTO-TSENTR `  (signed and verified)

MD5:
b4eda4d27cfd2d70a4015d6dd996f4fd

SHA-1:
00391d79516c3d24f9b83cb3bd7b03dfd1091a40

SHA-256:
9acafb025ebf6333dbc0018e66c3c1cb0422b06e69bbad62263bb633cc8aacf4

Scanner detections:
3 / 68

Status:
Potentially unwanted

Analysis date:
12/26/2024 3:34:40 PM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
ADWARE/Amonetize.Gen
8.3.2.2

ESET NOD32
Win32/Amonetize.HW potentially unwanted (variant)
9.12197

Reason Heuristics
PUP.FOTOTSENTR (M)
15.9.7.22

File size:
802.7 KB (821,936 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\pes.2011.full__7816_i1621986503_il1052368.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
7/10/2015 3:00:00 AM

Valid to:
7/10/2016 2:59:59 AM

Subject:
CN=LLC `FOTO-TSENTR `, O=LLC `FOTO-TSENTR `, STREET="Bud. 13-A kv. 1, Bolshaya Morskaya", L=Mykolayiv, S=Mykolayivska, PostalCode=54001, C=UA

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
4EA3FDADC06CB2C406A598621402321B

File PE Metadata
Compilation timestamp:
9/3/2015 6:02:37 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
24576:mQ6MThyb4YSixnBp+rCK7T9+SYuQFNtVU:mQ6MThKOrCg+Nw

Entry address:
0xADC8

Entry point:
E8, CB, 3F, 00, 00, E9, 2F, FE, FF, FF, CC, CC, CC, CC, CC, CC, 57, 56, 8B, 74, 24, 10, 8B, 4C, 24, 14, 8B, 7C, 24, 0C, 8B, C1, 8B, D1, 03, C6, 3B, FE, 76, 08, 3B, F8, 0F, 82, 73, 03, 00, 00, 0F, BA, 25, 98, 36, 43, 00, 01, 73, 07, F3, A4, E9, 17, 03, 00, 00, 81, F9, 80, 00, 00, 00, 0F, 82, CE, 01, 00, 00, 8B, C7, 33, C6, A9, 0F, 00, 00, 00, 75, 0E, 0F, BA, 25, E0, 21, 43, 00, 01, 0F, 82, E5, 04, 00, 00, 0F, BA, 25, 98, 36, 43, 00, 00, 0F, 83, A7, 01, 00, 00, F7, C7, 03, 00, 00, 00, 0F, 85, B8, 01, 00, 00...
 
[+]

Code size:
137 KB (140,288 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-205-251-251-114.jfk5.r.cloudfront.net  (205.251.251.114:80)

TCP (HTTP):
Connects to server-205-251-251-104.jfk5.r.cloudfront.net  (205.251.251.104:80)

TCP (HTTP):
Connects to ec2-54-204-40-188.compute-1.amazonaws.com  (54.204.40.188:80)