download.exe

so these collection

Alexnader Rogozin

The application download.exe by Alexnader Rogozin has been detected as adware by 22 anti-malware scanners. This is a setup program which is used to install the application. It is built using the Crossrider cross-browser extension toolkit. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider. The file has been seen being downloaded from applicationgrabb.net.
Publisher:
XML deleting a  (signed by Alexnader Rogozin)

Product:
so these collection

Version:
4.4.0.0

MD5:
fda4a196c863acf99b89680a1ec20379

SHA-1:
86b25c7ff71502fe542f58341353e37d9f2e8431

SHA-256:
902fc9dd08a3cbebe4d014f3dd60900534cc1df94c5edd2dfc064e9cb957d7be

Scanner detections:
22 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Analysis date:
4/20/2024 12:08:36 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Dropper.103
923

Agnitum Outpost
Trojan.Crossrider
7.1.1

AhnLab V3 Security
Adware/Win32.Agent
2014.07.24

Avira AntiVirus
Adware/MultiPlug.aob
7.11.163.164

avast!
Win32:PUP-gen [PUP]
140617-1

AVG
Adware Generic_r
2015.0.3401

Bitdefender
Gen:Variant.Adware.Dropper.103
1.0.20.1035

Dr.Web
Trojan.Crossrider.26283
9.0.1.05190

Emsisoft Anti-Malware
Gen:Variant.Adware.Dropper.103
8.14.07.26.04

ESET NOD32
Win32/AdWare.MultiPlug.AQ (variant)
8.10142

F-Secure
Gen:Variant.Adware.Dropper.103
11.2014-26-07_7

G Data
Gen:Variant.Adware.Dropper.103
14.7.24

IKARUS anti.virus
AdWare.SaveNet
t3scan.1.6.1.0

K7 AntiVirus
Adware
13.181.12819

Malwarebytes
PUP.Optional.Dropper
v2014.07.26.04

McAfee
PUP-FMH
5600.7057

MicroWorld eScan
Gen:Variant.Adware.Dropper.103
15.0.0.621

NANO AntiVirus
Trojan.Win32.Crossrider.dcotbl
0.28.2.61148

Panda Antivirus
PUP/TSUploader
14.07.26.04

Reason Heuristics
PUP.AlexnaderRogozin.I
14.7.27.14

Sophos
MultiPlug
4.98

VIPRE Antivirus
Threat.4150696
31208

File size:
778.9 KB (797,584 bytes)

Product version:
4.4.0.0

Copyright:
Copyright (c) 2014

Original file name:
recovering

File type:
Executable application (Win32 EXE)

Language:
English (United Kingdom)

Common path:
C:\users\{user}\downloads\download.exe

Digital Signature
Authority:
Unizeto Technologies S.A.

Valid from:
6/26/2014 2:53:30 PM

Valid to:
6/26/2015 2:53:30 PM

Subject:
E=alexnaderrogozin@yandex.ru, CN=Alexnader Rogozin, O=Alexnader Rogozin, C=UA

Issuer:
CN=Certum Code Signing CA, OU=Certum Certification Authority, O=Unizeto Technologies S.A., C=PL

Serial number:
03B69C746B4DCEA02DAF72658C82739E

File PE Metadata
Compilation timestamp:
7/21/2014 5:07:04 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
12288:PXKQK6uS5PrODE+jdzNuZn2q9/iQWsQpE9Xdu7lcooORcDrwhuzBNPeJogpgY2x0:PXb51PrYjjnutPM7DwEmB9eDpgEf

Entry address:
0x178DE

Entry point:
E8, 9F, 7D, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 18, DE, 42, 00, E8, FC, 0D, 00, 00, E8, 2E, 04, 00, 00, 0F, B7, F0, 6A, 02, E8, 32, 7D, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, F0, 45, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Entropy:
7.7603  (probably packed)

Code size:
136.5 KB (139,776 bytes)

The file download.exe has been seen being distributed by the following URL.

Remove download.exe - Powered by Reason Core Security