bypassandremoveicloudactivationalldevices711__7934_il1308839.exe

The application bypassandremoveicloudactivationalldevices711__7934_il1308839.exe has been detected as a potentially unwanted program by 16 anti-malware scanners. This is a setup program which is used to install the application. The setup program bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install. The file has been seen being downloaded from v4download.com.
Version:
1.1.5.90

MD5:
93e1e7989ffbb9efaec874ec8bf69bdb

SHA-1:
a5c84c1a2576a3a85a8f7bb8aa3daba6c72b3f92

SHA-256:
dbdfc9c27f45e78a75c1e7038ab2c71f7337350a16442dc53419da7d4afddb65

Scanner detections:
16 / 68

Status:
Potentially unwanted

Analysis date:
4/23/2024 11:03:56 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Application.Bundler.AirInstaller.1
738

AhnLab V3 Security
PUP/Win32.Amonetiz
2015.01.23

Avira AntiVirus
ADWARE/Adware.Gen2
7.11.204.170

avast!
Win32:Malware-gen
2014.9-150127

Baidu Antivirus
Adware.Win32.Amonetize
4.0.3.15127

Bitdefender
Gen:Variant.Application.Bundler.AirInstaller.1
1.0.20.135

Bkav FE
HW32.Packed
1.3.0.6379

ESET NOD32
Win32/Amonetize.BP (variant)
9.11061

F-Secure
Gen:Variant.Application.Bundler
11.2015-27-01_3

G Data
Gen:Variant.Application.Bundler.AirInstaller
15.1.24

Kaspersky
not-a-virus:AdWare.Win32.Amonetize
14.0.0.2576

MicroWorld eScan
Gen:Variant.Application.Bundler.AirInstaller.1
16.0.0.81

Qihoo 360 Security
HEUR/QVM18.1.Malware.Gen
1.0.0.1015

Sophos
Generic PUA KF
4.98

Trend Micro House Call
Suspicious_GEN.F47V0122
7.2.27

VIPRE Antivirus
Trojan.Win32.Generic
36904

File size:
290 KB (296,960 bytes)

Product version:
1.1.5.90

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\bypassandremoveicloudactivationalldevices711__7934_il1308839.exe

File PE Metadata
Compilation timestamp:
1/22/2015 8:03:54 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
6144:DzSaNSnPBgCpIGL+9lF6NghUIewEVmohy5BbpUt7V7WSsj:PS3PBPI8+F6Ngh74VmoENC7V7WSI

Entry address:
0x83279

Entry point:
60, E8, 00, 00, 00, 00, 58, 05, 5A, 0B, 00, 00, 8B, 30, 03, F0, 2B, C0, 8B, FE, 66, AD, C1, E0, 0C, 8B, C8, 50, AD, 2B, C8, 03, F1, 8B, C8, 57, 51, 49, 8A, 44, 39, 06, 88, 04, 31, 75, F6, 2B, C0, AC, 8B, C8, 80, E1, F0, 24, 0F, C1, E1, 0C, 8A, E8, AC, 0B, C8, 51, 02, CD, BD, 00, FD, FF, FF, D3, E5, 59, 58, 8B, DC, 8D, A4, 6C, 90, F1, FF, FF, 51, 2B, C9, 51, 51, 8B, CC, 51, 66, 8B, 17, C1, E2, 0C, 52, 57, 83, C1, 04, 51, 50, 83, C1, 04, 56, 51, E8, 5E, 00, 00, 00, 8B, E3, 5E, 5A, 2B, C0, 89, 04, 32, B4, 10...
 
[+]

Packer / compiler:
ASPack v1.08.04

Code size:
254.5 KB (260,608 bytes)

The file bypassandremoveicloudactivationalldevices711__7934_il1308839.exe has been seen being distributed by the following URL.