vadim.zeland.vzlom.tehnogennoj.sistemy.2013.mp.rar_05aib.exe

LTD Bronzovoye chudo

This is the bundle installer which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application vadim.zeland.vzlom.tehnogennoj.sistemy.2013.mp.rar_05aib.exe by LTD Bronzovoye chudo has been detected as adware by 25 anti-malware scanners. The program is a setup application that uses the Winner Download Manager installer. It is also typically executed from an Internet Explorer cache folder. The file has been seen being downloaded from a1.cdnde.net.
Publisher:
LTD Bronzovoye chudo  (signed and verified)

Description:
installer.exe

Version:
3.2.7.8

MD5:
496f349f0bee556e9964a780b53edfe4

SHA-1:
d64e53599d7f22421dcee84198425a964c467509

SHA-256:
1ce31fb168387b37ca722e8a8aae278db7624dfc60d4f9e69cee031e4fa86e65

Scanner detections:
25 / 68

Status:
Adware

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/27/2024 7:51:02 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Application.Kazy.503521
6454353

Agnitum Outpost
Riskware.Agent
7.1.1

Avira AntiVirus
APPL/OneInstaller.RI
7.11.211.248

avast!
Win32:Adware-CGC [PUP]
150203-1

AVG
Crypt3
2016.0.3191

Bitdefender
Gen:Variant.Application.Kazy.503521
1.0.20.265

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Trojan.Agent-822945
0.98/20089

Comodo Security
Application.Win32.OneInstaller.RI
21168

Dr.Web
Trojan.Packed.29383
9.0.1.05190

Emsisoft Anti-Malware
Gen:Variant.Application.Kazy.503521
9.0.0.4799

ESET NOD32
Win32/bmMedia.FL potentially unwanted application
7.0.302.0

F-Prot
W32/A-fdb27341
v6.4.7.1.166

F-Secure
Gen:Variant.Application.Kazy
11.2015-22-02_1

G Data
Gen:Variant.Application.Kazy.503521
15.2.25

IKARUS anti.virus
Win32.SuspectCrc
t3scan.1.8.6.0

K7 AntiVirus
Riskware
13.197.15043

MicroWorld eScan
Gen:Variant.Application.Kazy.503521
16.0.0.159

NANO AntiVirus
Trojan.Win32.BmMedia.djrdvh
0.30.0.296

Norman
Gen:Variant.Kazy.503521
03.12.2014 13:20:04

Panda Antivirus
Trj/Genetic.gen
15.02.22.04

Reason Heuristics
PUP.Installer.TIMP
15.2.22.3

VIPRE Antivirus
Trojan.Win32.Generic
37788

Zillya! Antivirus
Downloader.Agent.Win32.230542
2.0.0.2077

File size:
2.4 MB (2,494,464 bytes)

Product version:
1.0.0.0

Copyright:
Copyright (c) 2009

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Winner Download Manager

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\microsoft\windows\temporary internet files\content.ie5\{random}\vadim.zeland.vzlom.tehnogennoj.sistemy.2013.mp.rar_05aib.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
9/29/2014 3:00:00 AM

Valid to:
9/30/2015 2:59:59 AM

Subject:
CN=LTD Bronzovoye chudo, O=LTD Bronzovoye chudo, STREET="Proyezd Vnutrenniy 8, 9", L=Moscow, S=Russia, PostalCode=117452, C=RU

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
56C48ECA0599D73A34219BCC3191CDE7

File PE Metadata
Compilation timestamp:
11/21/2014 7:18:50 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
24576:m0aK+Bc4Tb61aNw5RyLrgtt1vWS9otSaLpxoJSvRHaf5e/w/JRDm8UBH6/8V:m0X+yC61RgAaV/AReQj2

Entry address:
0x2D640

Entry point:
55, 89, E5, 83, EC, 6C, 68, CE, 4B, 3F, 00, E8, A1, D5, FD, FF, FF, 75, 08, E8, 9D, 67, 00, 00, 8B, 85, 10, FF, FF, FF, C7, 40, 18, 50, C3, 43, 00, 66, 8B, 0D, 54, F1, 43, 00, 66, 89, 4B, 63, 8A, 15, 90, F0, 43, 00, 88, 53, 65, 8D, 7B, 45, B9, 07, 00, 00, 00, 8B, F3, E8, C1, 41, FE, FF, 8A, 57, 39, C6, 44, 24, 0F, 00, 84, D2, 74, F4, 8B, 3D, C0, F0, 43, 00, 74, E7, 39, 7D, 10, 7E, DB, B8, 8B, 01, 01, E0, 8B, 4D, F4, 64, 89, 0D, 00, 00, 00, 00, 83, C4, 14, 8B, C6, E8, C6, 04, FE, FF, 59, 66, 0F, B6, 0F, 66...
 
[+]

Code size:
240 KB (245,760 bytes)

The file vadim.zeland.vzlom.tehnogennoj.sistemy.2013.mp.rar_05aib.exe has been seen being distributed by the following URL.