five nights at freddys 3 downloader.zip
The file five nights at freddys 3 downloader.zip has been detected as a potentially unwanted program by 22 anti-malware scanners. It bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install. The file has been seen being downloaded from mymediadownloadsnow.com.
File name:
five nights at freddys 3 downloader.zip
MD5:
03f533e93f9b014d3b5360eed59bc94c
SHA-1:
313756f56591def3efb1511b13a99c3e94e991f2
SHA-256:
bc1ee17b8d03df4132d03deed55fb7895b8ba5dd2cbbb92c06b3251a18b2fb7a
Scanner detections:
22 / 68
Status:
Potentially unwanted
Analysis date:
5/17/2025 10:25:39 AM UTC (today)
Scan engine
Detection
Engine version
Lavasoft Ad-Aware
Gen:Variant.Application.Jatif.103
6547779
Agnitum Outpost
PUA.Agent
7.1.1
Avira AntiVirus
ADWARE/Adware.Gen2
7.11.218.100
avast!
Win32:PUP-gen [PUP]
2014.9-150318
Bitdefender
Gen:Variant.Application.Jatif.103
1.0.20.385
Comodo Security
Application.Win32.Amonetize.DAE
21455
Dr.Web
infected with Trojan.Amonetize.1122
9.0.1.05190
Emsisoft Anti-Malware
Gen:Variant.Application.Jatif.103
9.0.0.4799
ESET NOD32
Win32/Amonetize.DU potentially unwanted application
7.0.302.0
Fortinet FortiGate
Riskware/Amonetize
3/18/2015
F-Secure
Gen:Variant.Application.Jatif
11.2015-18-03_4
G Data
Gen:Variant.Application.Jatif.103
15.3.25
K7 AntiVirus
Trojan
13.201.15304
Malwarebytes
PUP.Optional.Amonetize
v2015.03.18.08
McAfee
Artemis!1CA83BE14509
5600.6822
MicroWorld eScan
Gen:Variant.Application.Jatif.103
16.0.0.231
NANO AntiVirus
Riskware.Win32.Amonetize.domjeo
0.30.8.659
Panda Antivirus
PUP/MultiToolbar.A
15.03.18.08
Sophos
PUA 'Amonetize'
5.12
Trend Micro House Call
TROJ_GE.EC26CBDC
7.2.77
VIPRE Antivirus
Trojan.Win32.Generic
38548
File size:
371.7 KB (380,592 bytes)
Common path:
C:\users\{user}\downloads\five nights at freddys 3 downloader.zip
The file five nights at freddys 3 downloader.zip has been seen being distributed by the following URL.