brazzersporngenerator__5160_i1434478919_il174451.exe

Prodlogistyka LLC

This is the Amonetize download manager which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application brazzersporngenerator__5160_i1434478919_il174451.exe by Prodlogistyka has been detected as adware by 12 anti-malware scanners. The program is a setup application that uses the Amonetize Downloader installer. The setup program bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install.
Publisher:
Prodlogistyka LLC  (signed and verified)

Version:
1.1.5.26

MD5:
67f333ec1c6e1dc9e68308e79817664a

SHA-1:
9974c3da2c4edfe2a54e8ed2b0eeb78923488c75

SHA-256:
b6636f0b253345c695ca1db74af44192c507429600ed2fc39a6019e20c84fe20

Scanner detections:
12 / 68

Status:
Adware

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
5/3/2024 11:39:51 PM UTC  (a few moments ago)

Scan engine
Detection
Engine version

AhnLab V3 Security
PUP/Win32.Amonetiz
2014.12.31

Avira AntiVirus
Adware/Amonetize.576200.16
7.11.198.192

Dr.Web
Trojan.Amonetize.341
9.0.1.0363

ESET NOD32
Win32/Amonetize.CK (variant)
8.10939

Fortinet FortiGate
Adware/Amonetize
12/31/2014

K7 AntiVirus
Unwanted-Program
13.188.14496

Kaspersky
not-a-virus:AdWare.Win32.Amonetize
14.0.0.2723

McAfee
Artemis!AB171716F944
5600.6899

Panda Antivirus
Generic Suspicious
14.12.31.04

Reason Heuristics
PUP.Installer.Prodlogistyka.q
15.1.4.13

Sophos
Generic PUA HM
4.98

Trend Micro House Call
TROJ_GEN.R047H07LU14
7.2.365

File size:
562.7 KB (576,200 bytes)

Product version:
1.1.5.26

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Amonetize Downloader

Language:
English (United States)

Common path:
C:\users\{user}\downloads\brazzersporngenerator__5160_i1434478919_il174451.exe

Digital Signature
Authority:
thawte, Inc.

Valid from:
12/15/2014 7:00:00 PM

Valid to:
12/16/2015 6:59:59 PM

Subject:
CN=Prodlogistyka LLC, O=Prodlogistyka LLC, L=Kharkiv, S=Alabama, C=UA

Issuer:
CN=thawte SHA256 Code Signing CA, O="thawte, Inc.", C=US

Serial number:
6EA4BF001566F2722AC7CE8C3A4F62AE

File PE Metadata
Compilation timestamp:
12/26/2014 1:07:40 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:K/XnAkWbEN1bq790zbDvQUCiU2/pMS4yro5NvbFET+z:K/wkWgN1bw0zbDvQUC2/qS4yrAvbFnz

Entry address:
0xB0FA

Entry point:
E8, 1A, 3E, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, 7D, 08, 00, 74, 2D, FF, 75, 08, 6A, 00, FF, 35, C4, 5B, 39, 00, FF, 15, A4, E0, 38, 00, 85, C0, 75, 18, 56, E8, 50, 2D, 00, 00, 8B, F0, FF, 15, 84, E0, 38, 00, 50, E8, 00, 2D, 00, 00, 59, 89, 06, 5E, 5D, C3, 8B, FF, 55, 8B, EC, 56, 8D, 45, 08, 50, 8B, F1, E8, 9A, ED, FF, FF, C7, 06, C0, EB, 38, 00, 8B, C6, 5E, 5D, C2, 04, 00, C7, 01, C0, EB, 38, 00, E9, DE, ED, FF, FF, 8B, FF, 55, 8B, EC, 56, 8B, F1, C7, 06, C0, EB, 38, 00, E8, CB, ED, FF, FF...
 
[+]

Entropy:
7.6689

Code size:
115.5 KB (118,272 bytes)

The file brazzersporngenerator__5160_i1434478919_il174451.exe has been seen being distributed by the following 8 URLs.

http://www.funnier-download.com/download.php?campid=11476&version=1.1.5.26&instid[appname]=Vi_Em_Loco_de_Amor.mp3&instid[appsetupurl]=http://static.convertonmp3.com/downloads/c8/16/Vi_Em_Loco_de_Amor.mp3?h=JwE5BCSdYcBGqaQHtwGEwA&e=1419884144&instid[cmdline]=%temp%/Download&instid[appimageurl]=http://youtubemp4s.com/apple-touch-icon.png&prefix=Vi.Em.Loco.de.Amor.mp3&instid[thankyoupage]=http://convertonmp3.com

http://fixdownloadz.com/4/download.php?i=44&soft_name=Clash of Clans Hack Tool&soft_version=2.5&soft_url=http://.../&t=aHR0cDovL3d3dy56aXBweXNoYXJlLmNvbS8=