0pvy+tvrq2.exe

AssetsManager

Aztec Media inc.

The application 0pvy+tvrq2.exe, “Assets Manager Install” by Aztec Media inc has been detected as adware by 14 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. It is also typically executed from the user's temporary directory. The file has been seen being downloaded from download.cdn.aztecbe.com.
Publisher:
Aztec Media Inc  (signed by Aztec Media inc.)

Product:
AssetsManager

Description:
Assets Manager Install

Version:
5.0.0.16064

MD5:
819d1ad145b8f074300f6f6365717329

SHA-1:
c2bf651618816a55d533905a07f6f4dbf376238c

SHA-256:
09492c27f021f5e922a9af02ae35e7bf5f4e8a4ab2a7d8e4317e20b5bd7d05df

Scanner detections:
14 / 68

Status:
Adware

Analysis date:
5/16/2024 11:20:53 PM UTC  (a few moments ago)

Scan engine
Detection
Engine version

Avira AntiVirus
PUA/SeaSuite.Gen
3.6.1.96

avast!
Win32:PUP-gen [PUP]
2014.9-150417

Clam AntiVirus
Win.Adware.Searchsuite-23
0.98/20503

ESET NOD32
multiple threats
9.7.0.302.0

F-Secure
Adware.Bandoo.C
11.2015-17-04_6

G Data
Win32.Application.Searchsuite
15.4.25

herdProtect (fuzzy)
2015.7.19.6

IKARUS anti.virus
not-a-virus:WebToolbar.SearchSuite
t3scan.1.8.9.0

Kaspersky
not-a-virus:WebToolbar.Win64.SearchSuite
14.0.0.2177

Malwarebytes
PUP.Optional.Linkey.A
v2015.04.17.04

Panda Antivirus
Generic Suspicious
15.04.17.04

Qihoo 360 Security
HEUR/QVM30.1.Malware.Gen
1.0.0.1015

Reason Heuristics
Threat.Installer.Aztec Media
15.4.17.12

Sophos
Generic PUA MC
4.98

File size:
3.3 MB (3,496,128 bytes)

Product version:
5.0.0.16064

Copyright:
Copyright (c) 2005 - 2015

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\0pvy+tvrq2.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
4/1/2015 2:00:00 AM

Valid to:
2/2/2018 12:59:59 AM

Subject:
CN=Aztec Media inc., O=Aztec Media inc., L=Panama City, S=Panama City, C=PA

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
2AF6396322BF5B08910274FFE4241447

File PE Metadata
Compilation timestamp:
2/24/2012 8:19:59 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
98304:CRwkz5nUnrui4l+tlfryJCV3NZco2n0Zm5vQT:eMeuprym3NZ72nWm9QT

Entry address:
0x39E3

Entry point:
81, EC, D4, 02, 00, 00, 53, 55, 56, 57, 6A, 20, 33, ED, 5E, 89, 6C, 24, 18, C7, 44, 24, 10, D8, 91, 40, 00, 89, 6C, 24, 14, FF, 15, 30, 80, 40, 00, 68, 01, 80, 00, 00, FF, 15, B8, 80, 40, 00, 55, FF, 15, C0, 82, 40, 00, 6A, 08, A3, B8, 2E, 47, 00, E8, 37, 2A, 00, 00, 55, 68, B4, 02, 00, 00, A3, D0, 2D, 47, 00, 8D, 44, 24, 38, 50, 55, 68, 1C, 93, 40, 00, FF, 15, 84, 81, 40, 00, 68, 04, 93, 40, 00, 68, C0, AD, 46, 00, E8, 19, 27, 00, 00, FF, 15, B4, 80, 40, 00, 50, BF, A0, 30, 4C, 00, 57, E8, 07, 27, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
28 KB (28,672 bytes)

The file 0pvy+tvrq2.exe has been seen being distributed by the following URL.

Remove 0pvy+tvrq2.exe - Powered by Reason Core Security