ati radeon drivers window 7_10924_i23033195_il345.exe

The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. The file has been seen being downloaded from downprov.gas-split.com and multiple other hosts.
MD5:
085e52e743a9200c3c996bfa390e5525

SHA-1:
7b3d46aa84fb2b9834c417f31c146a68197e6da0

SHA-256:
f40d0627deab55720a675860ed084c3e418fc46a6b8c88e2dd6e7af51f8117ce

Scanner detections:
5 / 68

Status:
Inconclusive  (not enough data for an accurate detection)

Analysis date:
5/16/2024 3:35:32 PM UTC  (today)

Scan engine
Detection
Engine version

Clam AntiVirus
Win.Adware.Amonetize-511
0.98/21511

Comodo Security
Application.Win32.LoadMoney.IARS
21100

McAfee
Artemis!085E52E743A9
5600.6846

Trend Micro House Call
Suspicious_GEN.F47V0127
7.2.54

VIPRE Antivirus
Trojan.Win32.Generic.pak!cobra
37612

File size:
282.2 KB (289,010 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\downloads\ati radeon drivers window 7_10924_i23033195_il345.exe

File PE Metadata
Compilation timestamp:
10/6/2014 9:40:26 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
6144:YGC7W7BU5NMqKGqcUz9Pbvfpa4lqmNJJ4jRXW52NMWj01CfEx5:qa7g+qKGqP9DvBBF5GXKEhj7G

Entry address:
0x322E

Entry point:
81, EC, D8, 02, 00, 00, 53, 55, 56, 57, 6A, 20, 33, ED, 5E, 89, 6C, 24, 18, C7, 44, 24, 10, D8, A2, 40, 00, 89, 6C, 24, 14, FF, 15, 34, 80, 40, 00, 68, 01, 80, 00, 00, FF, 15, 34, 81, 40, 00, 55, FF, 15, AC, 82, 40, 00, 6A, 09, A3, 78, 4F, 43, 00, E8, FD, 2E, 00, 00, A3, C4, 4E, 43, 00, 55, 8D, 44, 24, 38, 68, B4, 02, 00, 00, 50, 55, 68, D8, B1, 42, 00, FF, 15, 7C, 81, 40, 00, 68, C0, A2, 40, 00, 68, C0, 3E, 43, 00, E8, 68, 2B, 00, 00, FF, 15, 38, 81, 40, 00, BB, 00, F0, 43, 00, 50, 53, E8, 56, 2B, 00, 00...
 
[+]

Entropy:
7.9161

Packer / compiler:
Nullsoft install system v2.x

Code size:
24.5 KB (25,088 bytes)

The file ati radeon drivers window 7_10924_i23033195_il345.exe has been seen being distributed by the following 2 URLs.