food technology new technolog downloader.zip
The file food technology new technolog downloader.zip has been detected as a potentially unwanted program by 22 anti-malware scanners. It bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install. The file has been seen being downloaded from mynewmediadownloads.com.
File name:
food technology new technolog downloader.zip
MD5:
d6783006e05004a32569389a794f5e12
SHA-1:
f8d77ab62dae6ab949656ad4e8423e93a7d35367
SHA-256:
d074c6b953604e9dce28bdd09247f5646641760a4209232e1ced2b7f0f7ee9b4
Scanner detections:
22 / 68
Status:
Potentially unwanted
Analysis date:
1/2/2026 11:50:05 AM UTC (today)
Scan engine
Detection
Engine version
Lavasoft Ad-Aware
Gen:Variant.Application.Jatif.103
5650986
Agnitum Outpost
PUA.Amonetize
7.1.1
avast!
Win32:Adware-gen [Adw]
2014.9-150421
Bitdefender
Gen:Variant.Application.Jatif.103
1.0.20.555
Comodo Security
Application.Win32.Amonetize.DAE
21845
Dr.Web
infected with Trojan.Amonetize.1755
9.0.1.05190
Emsisoft Anti-Malware
Gen:Variant.Application.Jatif.103
9.0.0.4799
ESET NOD32
Win32/Amonetize.EE potentially unwanted application
7.0.302.0
Fortinet FortiGate
Riskware/Amonetize
4/21/2015
F-Secure
Gen:Variant.Application.Jatif
11.2015-21-04_3
G Data
Gen:Variant.Application.Jatif.103
15.4.25
K7 AntiVirus
Trojan
13.203.15658
Malwarebytes
PUP.Optional.Amonetize
v2015.04.21.01
McAfee
Artemis!DBA9CD589D61
5600.6788
MicroWorld eScan
Gen:Variant.Application.Jatif.103
16.0.0.333
NANO AntiVirus
Riskware.Win32.Amonetize.dpgpck
0.30.20.1219
Panda Antivirus
PUP/MultiToolbar.A
15.04.21.01
Qihoo 360 Security
HEUR/QVM10.1.Malware.Gen
1.0.0.1015
Trend Micro House Call
TROJ_GE.E6B8E6D6
7.2.111
VIPRE Antivirus
Amonetize
39546
File size:
370.6 KB (379,493 bytes)
Common path:
C:\users\{user}\downloads\food technology new technolog downloader.zip
The file food technology new technolog downloader.zip has been seen being distributed by the following URL.