windows7loader3503__4940_il2766.exe

The application windows7loader3503__4940_il2766.exe has been detected as a potentially unwanted program by 25 anti-malware scanners. This is a setup program which is used to install the application. The setup program bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install. The file has been seen being downloaded from www.averagedownload.com a web site host known to distribute potentially unwanted software operated by Amonetize ltd..
Version:
1.1.8.22

MD5:
c74e99937d1f662d4d065e4babc8a656

SHA-1:
133a221b6b4dc9a8bb04361730c00b37365f65bb

SHA-256:
1365247585b01ebbef4aff88d8084a291b0f80f2f62aaf589712a2acb19837b0

Scanner detections:
25 / 68

Status:
Potentially unwanted

Analysis date:
11/23/2024 8:14:00 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.Amonetize
7.1.1

AhnLab V3 Security
PUP/Win32.Amonetiz
14.05.12

Avira AntiVirus
ADWARE/Adware.Gen2
7.11.142.4

avast!
Win32:Amonetize-AD [PUP]
2014.9-140512

Baidu Antivirus
Adware.Win32.Amonetize
4.0.3.14512

Bitdefender
Trojan.GenericKD.1623615
1.0.20.660

Dr.Web
Adware.Downware.2453
9.0.1.0132

Emsisoft Anti-Malware
Trojan.GenericKD.1623615
8.14.05.12.05

ESET NOD32
Win32/Amonetize.AJ (variant)
8.9651

Fortinet FortiGate
Riskware/Amonetize
5/12/2014

F-Secure
Trojan.GenericKD.1623615
11.2014-12-05_2

G Data
Trojan.GenericKD.1623615
14.5.24

IKARUS anti.virus
Trojan.SuspectCRC
t3scan.1.6.1.0

K7 AntiVirus
Trojan
13.176.11696

Kaspersky
not-a-virus:HEUR:AdWare.Win32.Amonetize
14.0.0.3879

Malwarebytes
PUP.Optional.Amonetize.A
v2014.05.12.05

McAfee
RDN/Generic PUP.x!bxh
5600.7133

MicroWorld eScan
Trojan.GenericKD.1623615
15.0.0.396

nProtect
Trojan.GenericKD.1623615
14.04.08.01

Panda Antivirus
Trj/CI.A
14.05.12.05

Qihoo 360 Security
Win32/Virus.Adware.932
1.0.0.1015

Reason Heuristics
Threat.Win.Reputation.IMP
14.5.12.5

Sophos
Amonetize
4.98

Trend Micro House Call
TROJ_GEN.R0CBH06D514
7.2.132

VIPRE Antivirus
Trojan.Win32.Generic
28128

File size:
325.5 KB (333,312 bytes)

Product version:
1.1.8.22

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\windows7loader3503__4940_il2766.exe

File PE Metadata
Compilation timestamp:
3/27/2014 1:32:54 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
6144:f4+u5ppXe0beXREBIBmURBeLf8YKAetxe+BsPG/fxUBz/Kjj7ai3Z0BH4o:f4+u5pvyXQamU7eL9Oe8P/f2BLKjj7at

Entry address:
0x27A61

Entry point:
E8, 50, 8D, 00, 00, E9, 89, FE, FF, FF, CC, CC, CC, CC, CC, 53, 56, 8B, 44, 24, 18, 0B, C0, 75, 18, 8B, 4C, 24, 14, 8B, 44, 24, 10, 33, D2, F7, F1, 8B, D8, 8B, 44, 24, 0C, F7, F1, 8B, D3, EB, 41, 8B, C8, 8B, 5C, 24, 14, 8B, 54, 24, 10, 8B, 44, 24, 0C, D1, E9, D1, DB, D1, EA, D1, D8, 0B, C9, 75, F4, F7, F3, 8B, F0, F7, 64, 24, 18, 8B, C8, 8B, 44, 24, 14, F7, E6, 03, D1, 72, 0E, 3B, 54, 24, 10, 77, 08, 72, 07, 3B, 44, 24, 0C, 76, 01, 4E, 33, D2, 8B, C6, 5E, 5B, C2, 10, 00, 57, 8B, C6, 83, E0, 0F, 85, C0, 0F...
 
[+]

Code size:
231 KB (236,544 bytes)

The file windows7loader3503__4940_il2766.exe has been seen being distributed by the following URL.

Remove windows7loader3503__4940_il2766.exe - Powered by Reason Core Security