savingswave.exe
Savings Wave
Innovative Apps
This is part of a distribution package that is classified as adware distributed by 50onRed. This adware is used to interact with the installed web browsers and inject ads and modify the default search and homepages. The application savingswave.exe, “Savings Wave Installer” by Innovative Apps has been detected as adware by 8 anti-malware scanners. This web browser addon will display additional advertisements in the user's browser including popup, banner, contextual hyperlinks as well as affiliate links.
File name:
savingswave.exe
Publisher:
215 Apps (signed by Innovative Apps)
Description:
Savings Wave Installer
MD5:
b46cf9c8a72e02b1950cb2d719bb22db
SHA-1:
7b7ffe47170c4bf2249efc99af4501ed2fa544e4
SHA-256:
c6d54a13e8bb43b4dab6938983525977018b88ab38a4cf1dbd83dd25ab4a7d57
Scanner detections:
8 / 68
Explanation:
Browser extension that injects additional advertisements (banner and text links) on web pages.
Analysis date:
11/23/2024 5:09:56 PM UTC (today)
Scan engine
Detection
Engine version
avast!
Win32:Installer-M [Adw]
2014.9-130803
Bkav FE
HW32.CDB
1.3.0.4246
Boost by Reason
Trojan.Adw.Installer.InnovativeApps.L
2013.8.3.17
Dr.Web
Adware.Downware.1054
9.0.1.0215
ESET NOD32
Win32/Packed.ScrambleWrapper
7.8831
Reason Heuristics
PUP.Installer.InnovativeApps.L
14.8.7.17
Trend Micro House Call
TROJ_GEN.F47V0717
7.2.215
VIPRE Antivirus
GamePlayLabs
21730
File size:
4 MB (4,162,176 bytes)
Copyright:
Copyright 215 Apps
File type:
Executable application (Win32 EXE)
Language:
English (United States)
Common path:
C:\users\{user}\downloads\savingswave.exe
Valid from:
1/8/2013 4:00:00 PM
Valid to:
1/9/2014 3:59:59 PM
Subject:
CN=Innovative Apps, O=Innovative Apps, L=Philadelphia, S=Pennsylvania, C=US
Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US
Serial number:
5419E32FDAD7A6E5666A35066C5EAAC5
Compilation timestamp:
1/5/2010 4:09:32 AM
CTPH (ssdeep):
98304:M5XWDxnrxETjYkX3RLrXDpR0rhyTtoEKTw:1ndc3RLDDpGQTtovw
Code size:
33 KB (33,792 bytes)
The file savingswave.exe has been seen being distributed by the following URL.