windows 7 activator.zip
The file windows 7 activator.zip has been detected as a potentially unwanted program by 24 anti-malware scanners. It bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install. The file has been seen being downloaded from download2-cdn.com.
File name:
windows 7 activator.zip
MD5:
86e15cf37a0affbae447cc3a8cea031e
SHA-1:
3746e147bb713385a5fed68bcd75d870fb8feca1
SHA-256:
18640b49e8349f69951ad787f6ebeda07778b4f353e4f98d851701da3c82537a
Scanner detections:
24 / 68
Status:
Potentially unwanted
Analysis date:
12/25/2024 4:38:37 PM UTC (today)
Scan engine
Detection
Engine version
Lavasoft Ad-Aware
Gen:Variant.Adware.Graftor.225227
5921669
Agnitum Outpost
PUA.Amonetize
7.1.1
Avira AntiVirus
ADWARE/Amonetize.kpb
8.3.1.6
Arcabit
Trojan.Adware.Graftor.D36FCB
1.0.0.425
avast!
Win32:Amonetize-KF [PUP]
2014.9-150809
Bitdefender
Gen:Variant.Adware.Graftor.225227
1.0.20.1105
Dr.Web
infected with Trojan.Amonetize.4075
9.0.1.05190
Emsisoft Anti-Malware
Gen:Variant.Adware.Graftor.225227
10.0.0.5366
ESET NOD32
Win32/Amonetize.FY potentially unwanted (variant)
9.12067
Fortinet FortiGate
Riskware/Amonetize
8/9/2015
F-Prot
W32/Amonetize.R.gen
v6.4.7.1.166
F-Secure
Gen:Variant.Adware.Graftor
11.2015-09-08_1
G Data
Gen:Variant.Adware.Graftor.225227
15.8.25
IKARUS anti.virus
AdWare.Amonetize
t3scan.1.9.5.0
MicroWorld eScan
Gen:Variant.Adware.Graftor.225227
16.0.0.663
NANO AntiVirus
Trojan.Win32.Amonetize.duavst
0.30.24.3079
Norman
Gen:Variant.Adware.Graftor.225227
04.08.2015 10:30:46
Qihoo 360 Security
Win32/Virus.Adware.8c5
1.0.0.1015
Sophos
Generic PUA EE (PUA)
4.98
Trend Micro House Call
TROJ_GE.C7F8733E
7.2.221
Trend Micro
TROJ_GE.C7F8733E
10.465.09
VIPRE Antivirus
Amonetize
42742
Zillya! Antivirus
Adware.Amonetize.Win32.5617
2.0.0.2341
File size:
648.5 KB (664,036 bytes)
Common path:
C:\users\{user}\downloads\windows 7 activator.zip
The file windows 7 activator.zip has been seen being distributed by the following URL.