dcytdkiemon_amodk_setup.exe

The application dcytdkiemon_amodk_setup.exe has been detected as a potentially unwanted program by 18 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler. While running, it connects to the Internet address server-54-192-48-4.jfk5.r.cloudfront.net on port 80 using the HTTP protocol.
Version:
2.11.0.999

MD5:
3729c86a5569d550f508b4ba8f48782a

SHA-1:
07a7d127daf74c917db23ae66e2124e6f54477ac

SHA-256:
1887694c16f18eade03303a7db04260de719ec3efcdc2dfcad5261ca5cef224b

Scanner detections:
18 / 68

Status:
Potentially unwanted

Explanation:
May modify the web browser's settings including changing the homepage and search provider in addition to delivering ads (by injecting banner and text-links directly in the webpage).

Analysis date:
4/25/2024 6:42:04 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Mikey.21858
513

AhnLab V3 Security
PUP/Win32.CrossRider
2015.09.09

Avira AntiVirus
ADWARE/Adware.Gen7
8.3.2.2

Arcabit
Trojan.Adware.Mikey.D5562
1.0.0.525

avast!
Win32:GenMaliciousA-IJF [PUP]
2014.9-150909

Bitdefender
Gen:Variant.Adware.Mikey.21858
1.0.20.1260

Dr.Web
Adware.Downware.8569
9.0.1.0252

Emsisoft Anti-Malware
Gen:Variant.Adware.Mikey.21858
8.15.09.09.08

ESET NOD32
Win32/SpeedBit.C potentially unwanted (variant)
9.12224

F-Secure
Gen:Variant.Adware.Mikey
11.2015-09-09_4

G Data
Gen:Variant.Adware.Mikey.21858
15.9.25

IKARUS anti.virus
PUA.SpeedBit
t3scan.1.9.5.0

Kaspersky
HEUR:Trojan.Win32.Generic
14.0.0.1451

MicroWorld eScan
Gen:Variant.Adware.Mikey.21858
16.0.0.756

Panda Antivirus
Trj/Genetic.gen
15.09.09.08

Reason Heuristics
Threat.Win.Reputation.IMP
15.9.9.20

SUPERAntiSpyware
PUP.SpeedBit/Variant
9639

Vba32 AntiVirus
TrojanDropper.Agent
3.12.26.4

File size:
1.2 MB (1,229,824 bytes)

Product version:
2.11.0.999

Copyright:
Copyright (C) 2014

File type:
Executable application (Win32 EXE)

Language:
English

Common path:
C:\users\{user}\appdata\local\installer\install_28455\dcytdkiemon_amodk_setup.exe

File PE Metadata
Compilation timestamp:
9/8/2015 3:44:54 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
24576:vZMnbO5ujowkX2k2WtU5J77e5VRe33RaCC4JtWq23LCijTtLXGcMaG0r6b:CKujdkX2k2WE7K/w33RaCCoMq23LhPtq

Entry address:
0x60A78

Entry point:
E8, 6A, DF, 00, 00, E9, 7F, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 8B, 54, 24, 0C, 8B, 4C, 24, 04, 85, D2, 74, 7F, 0F, B6, 44, 24, 08, 0F, BA, 25, B8, 7B, 4E, 00, 01, 73, 0D, 8B, 4C, 24, 0C, 57, 8B, 7C, 24, 08, F3, AA, EB, 5D, 8B, 54, 24, 0C, 81, FA, 80, 00, 00, 00, 7C, 0E, 0F, BA, 25, 80, 47, 4E, 00, 01, 0F, 82, 9B, E0, 00, 00, 57, 8B, F9, 83, FA, 04, 72, 31, F7, D9, 83, E1, 03, 74, 0C, 2B, D1, 88, 07, 83, C7, 01, 83, E9, 01, 75, F6, 8B, C8, C1, E0, 08, 03, C1, 8B, C8, C1, E0...
 
[+]

Entropy:
6.6265

Code size:
668.5 KB (684,544 bytes)

Scheduled Task
Task name:
Inst_Rep

Trigger:
Registration (Runs on registration)


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-192-48-4.jfk5.r.cloudfront.net  (54.192.48.4:80)

TCP (HTTP):
Connects to server-205-251-251-57.jfk5.r.cloudfront.net  (205.251.251.57:80)

TCP (HTTP):
Connects to server-205-251-251-120.jfk5.r.cloudfront.net  (205.251.251.120:80)

Remove dcytdkiemon_amodk_setup.exe - Powered by Reason Core Security