294823_.exe

security

Daniel Palad

The application 294823_.exe by Daniel Palad has been detected as adware by 35 anti-malware scanners. It is built using the Crossrider cross-browser extension platform. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider. It is also typically executed from the user's temporary directory.
Publisher:
their database support use requirements  (signed by Daniel Palad)

Product:
security

Version:
2.2.0.0

MD5:
be1514aa05a1b5898908b6bca45536d2

SHA-1:
b0fd3ea4b698da3be2fa9eb6fdf2d9a53f11cbb3

SHA-256:
ba424e57ddf01baf4bce3d5ab0852229f0d0cc6e798107ab7e82a3ce3a1d56c5

Scanner detections:
35 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Analysis date:
4/25/2024 12:29:37 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Dropper.101
358

Agnitum Outpost
PUA.MultiPlug
7.1.1

AhnLab V3 Security
Trojan/Win32.Agent
16.02.11

Avira AntiVirus
ADWARE/Adware.Gen7
7.11.145.66

avast!
Win32:MultiPlug-AI [PUP]
2014.9-160211

AVG
Generic_r
2017.0.2836

Bitdefender
Gen:Variant.Adware.Dropper.101
1.0.20.210

Bkav FE
W32.MultiPlugAR.Adware
1.3.0.4959

Clam AntiVirus
Win.Adware.Agent-6532
0.98/19086

Comodo Security
Application.Win32.Multiplug.R
18165

Dr.Web
Trojan.Crossrider.4243
9.0.1.042

Emsisoft Anti-Malware
Gen:Variant.Adware.Dropper.101
8.16.02.11.06

ESET NOD32
Win32/AdWare.MultiPlug (variant)
10.9720

Fortinet FortiGate
Riskware/MultiPlug
2/11/2016

F-Prot
W32/A-dacaee66
v6.4.7.1.166

F-Secure
Gen:Variant.Adware.Dropper.101
11.2016-11-02_5

G Data
Gen:Variant.Adware.Dropper.101
16.2.24

IKARUS anti.virus
Win32.SuspectCrc
t3scan.1.6.1.0

K7 AntiVirus
Adware
13.176.11873

Kaspersky
not-a-virus:AdWare.Win32.MultiPlug
14.0.0.676

Malwarebytes
PUP.Optional.MultiPlug.A
v2016.02.11.06

McAfee
PUP-FID!08554BF4C7CB
5600.6492

MicroWorld eScan
Gen:Variant.Adware.Dropper.101
17.0.0.126

NANO AntiVirus
Trojan.Win32.Crossrider.cuwgpc
0.28.0.59492

Norman
Gen:Variant.Adware.Dropper.103
11.20160211

Panda Antivirus
Trj/Genetic.gen
16.02.11.06

Qihoo 360 Security
Malware.QVM10.Gen
1.0.0.1015

Quick Heal
AdWare.Agent.r6 (Not a Virus)
2.16.14.00

Reason Heuristics
PUP.DanielPalad (M)
16.2.11.18

Rising Antivirus
PE:Malware.MultiPlug!6.13CF
23.00.65.16209

Sophos
MultiPlug
4.98

Trend Micro House Call
TROJ_GEN.R08NH06EL14
7.2.42

Vba32 AntiVirus
AdWare.MultiPlug
3.12.26.0

VIPRE Antivirus
Trojan.Win32.Generic
28594

Zillya! Antivirus
Adware.Agent.Win32.9608
2.0.0.1846

File size:
1.9 MB (1,940,768 bytes)

Product version:
2.2.0.0

Copyright:
Copyright (c) 2014

Original file name:
card they

File type:
Executable application (Win32 EXE)

Language:
English (United Kingdom)

Common path:
C:\users\{user}\appdata\local\temp\294823_.exe

Digital Signature
Signed by:

Authority:
Unizeto Technologies S.A.

Valid from:
1/8/2014 4:22:34 PM

Valid to:
1/8/2015 4:22:34 PM

Subject:
E=daniel.palad@hotmail.com, CN="Open Source Developer, Daniel Palad", O=Daniel Palad, C=IL

Issuer:
CN=Certum Level III CA, OU=Certum Certification Authority, O=Unizeto Technologies S.A., C=PL

Serial number:
40E879F8942E9B666656C235479922A6

File PE Metadata
Compilation timestamp:
5/20/2014 2:43:14 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
49152:SeZEIA9kBz/zM8ZgLgDfosPJmqiVLbuMKRj3WWB:StKBz7MhgDQsh3iNZajJ

Entry address:
0x10ACB

Entry point:
E8, BE, 4A, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, C0, 21, 42, 00, E8, 9F, 21, 00, 00, E8, E0, 07, 00, 00, 0F, B7, F0, 6A, 02, E8, 51, 4A, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, 10, 38, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Entropy:
7.9339  (probably packed)

Code size:
103.5 KB (105,984 bytes)

Remove 294823_.exe - Powered by Reason Core Security