windowsloaderv226pc__7934_il6761.exe

Ogetst

Lider Tekhniks, TOV

The application windowsloaderv226pc__7934_il6761.exe by Lider Tekhniks, TOV has been detected as a potentially unwanted program by 4 anti-malware scanners. It bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install. The file has been seen being downloaded from 389883.superfastdownload000.site.
Publisher:
Ogest Inc  (signed by Lider Tekhniks, TOV)

Product:
Ogetst

Description:
Ogest

Version:
21.0.1.4

MD5:
dd0aa10cbd4fa4350fb9fa9c13f4890f

SHA-1:
ee1b560bf20a46610f4053f46e4dde16ad0ebb69

SHA-256:
3a5b2826b1338f2162a54e1045598216be20e143e0e75b7ccd686d33b52ccd6d

Scanner detections:
4 / 68

Status:
Potentially unwanted

Analysis date:
12/22/2024 8:59:34 PM UTC  (today)

Scan engine
Detection
Engine version

avast!
Win32:Dropper-gen [Drp]
160727-0

ESET NOD32
Win32/Amonetize.NY potentially unwanted application
8.0.319.0

Reason Heuristics
PUP.Amonetize.LiderTek (M)
16.7.27.16

VIPRE Antivirus
Threat.4150696
50750

File size:
746.2 KB (764,113 bytes)

Product version:
21.0.1.4

Original file name:
orelease.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\windowsloaderv226pc__7934_il6761.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
7/19/2016 5:30:00 AM

Valid to:
7/20/2017 5:29:59 AM

Subject:
CN="Lider Tekhniks, TOV", OU=IT, O="Lider Tekhniks, TOV", STREET="Vulytsya Vasylkivska, Budynok 34", L=Kyyiv, S=Kyyiv, PostalCode=03022, C=UA

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
653F39D679F9B114375253C156AABB95

File PE Metadata
Compilation timestamp:
7/21/2016 11:38:43 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
12288:00NmBKWT9itnnICilw6/wjTBAZS4o8NiHBc3zQFnEW6F0SNBiNfffffffffffff6:0EG5T0ZHilw64AzJkHBcMGNBW/m

Entry address:
0xB44F

Entry point:
E8, C7, 56, 00, 00, E9, 39, FE, FF, FF, 55, 8B, EC, 83, 7D, 08, 00, 74, 2D, FF, 75, 08, 6A, 00, FF, 35, 54, 1B, 43, 00, FF, 15, 2C, 30, 42, 00, 85, C0, 75, 18, 56, E8, 07, 0A, 00, 00, 8B, F0, FF, 15, 28, 30, 42, 00, 50, E8, 52, 0A, 00, 00, 59, 89, 06, 5E, 5D, C3, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 57, 56, 53, 33, FF, 8B, 44, 24, 14, 0B, C0, 7D, 14, 47, 8B, 54, 24, 10, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 14, 89, 54, 24, 10, 8B, 44, 24, 1C, 0B, C0, 7D, 14, 47, 8B, 54, 24, 18, F7...
 
[+]

Entropy:
7.4044

Code size:
135.5 KB (138,752 bytes)

The file windowsloaderv226pc__7934_il6761.exe has been seen being distributed by the following URL.

Remove windowsloaderv226pc__7934_il6761.exe - Powered by Reason Core Security