secondlifehacklindendollarhack__7934_il295510.exe

Install Path Ltd

This is the Amonetize download manager which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application secondlifehacklindendollarhack__7934_il295510.exe by Install Path has been detected as adware by 22 anti-malware scanners. The program is a setup application that uses the Amonetize Downloader installer. The setup program bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install.
Publisher:
Install Path Ltd  (signed and verified)

Version:
1.1.5.90

MD5:
aeae45495d5bb9b71136983308e2acb6

SHA-1:
0947445554eea08542d5922459f8cc8e617ace88

SHA-256:
7dc9d34ca500904a52cf7af034dd206b8dc2a26e24a604bb2ac644993517bb29

Scanner detections:
22 / 68

Status:
Adware

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
12/26/2024 12:09:16 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Application.Jatif.103
729

AhnLab V3 Security
PUP/Win32.Amonetiz
2015.02.04

Avira AntiVirus
ADWARE/Adware.Gen4
7.11.206.214

avast!
Win32:Trojan-gen
2014.9-150205

AVG
InstallPath.7F5
2016.0.3207

Baidu Antivirus
Adware.Win32.Amonetize
4.0.3.1525

Bitdefender
Gen:Variant.Application.Jatif.103
1.0.20.180

Bkav FE
W32.HfsAdware
1.3.0.6379

Dr.Web
Trojan.Amonetize.441
9.0.1.036

ESET NOD32
Win32/Amonetize.DE potentially unwanted (variant)
9.11119

Fortinet FortiGate
Adware/Amonetize
2/5/2015

F-Secure
Gen:Variant.Application.Jatif
11.2015-05-02_5

G Data
Gen:Variant.Application.Jatif.103
15.2.25

Kaspersky
not-a-virus:AdWare.Win32.Amonetize
14.0.0.2530

Malwarebytes
PUP.Optional.Amonetize
v2015.02.05.10

McAfee
Artemis!AEAE45495D5B
5600.6863

MicroWorld eScan
Gen:Variant.Application.Jatif.103
16.0.0.108

Panda Antivirus
PUP/MultiToolbar.A
15.02.05.10

Reason Heuristics
PUP.Installer.Amonetize
15.2.5.22

Sophos
Generic PUA AJ
4.98

Trend Micro House Call
Suspicious_GEN.F47V0202
7.2.36

VIPRE Antivirus
Trojan.Win32.Generic
37226

File size:
650.1 KB (665,704 bytes)

Product version:
1.1.5.90

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Amonetize Downloader

Language:
English (United States)

Common path:
C:\users\{user}\downloads\secondlifehacklindendollarhack__7934_il295510.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
1/19/2015 6:00:00 PM

Valid to:
1/20/2016 5:59:59 PM

Subject:
CN=Install Path Ltd, OU=Install Path Ltd, O=Install Path Ltd, POBox=5252006, STREET=5 Jabotinsky, L=Ramat Gan, S=Israel, PostalCode=5252006, C=IL

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
2E1A17FA8AA2A44E9135D585D48E6C41

File PE Metadata
Compilation timestamp:
1/29/2015 9:40:05 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:cRvec5T/QTU5I0N4JQRRp1iuFkE6NymgyI7WR+NDehjI:cpec5ToTr0UQRr1rFkECR+Ehs

Entry address:
0xDEB8

Entry point:
E8, C1, 4A, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, 3D, EC, 1E, 38, 00, 00, 75, 18, E8, 9F, 34, 00, 00, 6A, 1E, E8, E9, 32, 00, 00, 68, FF, 00, 00, 00, E8, F0, F8, FF, FF, 59, 59, 8B, 45, 08, 85, C0, 75, 01, 40, 50, 6A, 00, FF, 35, EC, 1E, 38, 00, FF, 15, 9C, 70, 37, 00, 5D, C3, 8B, FF, 55, 8B, EC, 53, 8B, 5D, 08, 83, FB, E0, 77, 6F, 56, 57, 83, 3D, EC, 1E, 38, 00, 00, 75, 18, E8, 55, 34, 00, 00, 6A, 1E, E8, 9F, 32, 00, 00, 68, FF, 00, 00, 00, E8, A6, F8, FF, FF, 59, 59, 85, DB, 74, 04, 8B, C3...
 
[+]

Entropy:
7.6009

Code size:
148.5 KB (152,064 bytes)

The file secondlifehacklindendollarhack__7934_il295510.exe has been seen being distributed by the following URL.