windowsloaderv225pc__7934_il11269.exe

January Frost

Tekhniks Yukrein, TOV

The application windowsloaderv225pc__7934_il11269.exe by Tekhniks Yukrein, TOV has been detected as a potentially unwanted program by 3 anti-malware scanners. This is a setup program which is used to install the application. It bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install. The file has been seen being downloaded from 714539.superfastdownload000.site.
Publisher:
January Inc  (signed by Tekhniks Yukrein, TOV)

Product:
January Frost

Version:
2.0.1.0

MD5:
bb31b5e5891cded0eeedb69b23efada4

SHA-1:
67969c529fb8c36d2c9f8c3e80e3b61ebaaf3f03

SHA-256:
6f0e3be3118183098f45cce509f90336c7bd195d8ac303e63fc6f35c2596515b

Scanner detections:
3 / 68

Status:
Potentially unwanted

Analysis date:
12/22/2024 8:36:58 PM UTC  (today)

Scan engine
Detection
Engine version

ESET NOD32
Win32/Amonetize.VR potentially unwanted application
8.0.319.0

Microsoft Security Essentials
Threat.Undefined
1.225.2268.0

Reason Heuristics
Adware.Amonetize.Tekhniks.Meta (M)
16.7.25.2

File size:
769.2 KB (787,663 bytes)

Product version:
2.0.1.0

Original file name:
jf.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\windowsloaderv225pc__7934_il11269.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
6/29/2016 2:00:00 AM

Valid to:
6/30/2017 1:59:59 AM

Subject:
CN="Tekhniks Yukrein, TOV", OU=IT, O="Tekhniks Yukrein, TOV", STREET="bul. Ivana Lepse, 8, 12", L=Kyyiv, S=Kyyiv, PostalCode=03680, C=UA

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00B5C5A557F030D9EE069A751603825CAD

File PE Metadata
Compilation timestamp:
7/21/2016 9:08:45 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
12288:JhX9ce3ueUJlj8TSJiCddLEdVE10csOw+hvX0r8mG2:reGiJlj8m4cd+V40cVX0rRV

Entry address:
0xECEF

Entry point:
E8, A7, 37, 00, 00, E9, 39, FE, FF, FF, 55, 8B, EC, 83, 7D, 08, 00, 74, 2D, FF, 75, 08, 6A, 00, FF, 35, 94, 3B, 43, 00, FF, 15, B0, 70, 42, 00, 85, C0, 75, 18, 56, E8, F6, 17, 00, 00, 8B, F0, FF, 15, 54, 70, 42, 00, 50, E8, 41, 18, 00, 00, 59, 89, 06, 5E, 5D, C3, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 80, F9, 40, 73, 15, 80, F9, 20, 73, 06, 0F, AD, D0, D3, EA, C3, 8B, C2, 33, D2, 80, E1, 1F, D3, E8, C3, 33, C0, 33, D2, C3, 55, 8B, EC, 53, 8B, 5D, 10, 57, 33, FF, 85, DB, 75, 14, E8, A1...
 
[+]

Code size:
150.5 KB (154,112 bytes)

The file windowsloaderv225pc__7934_il11269.exe has been seen being distributed by the following URL.

Remove windowsloaderv225pc__7934_il11269.exe - Powered by Reason Core Security