image lineflstudioproduceredition12.0.2__6629_i1535058309_il14188.exe

LLC

The application image lineflstudioproduceredition12.0.2__6629_i1535058309_il14188.exe by LLC has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. It is also typically executed from the user's temporary directory. While running, it connects to the Internet address server-54-230-95-194.fra2.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
LLC   (signed and verified)

Version:
1.1.5.26

MD5:
f4a78c1e40b6cdf388aef1c2c3926f12

SHA-1:
1698d5dcd6f15146dbb0e35840d5cf15284961b9

SHA-256:
929a7771db68a24f3a4b027169bc1928d6c4ad16df491d2fae1194ac4b4140b7

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
5/3/2024 4:36:28 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Amonitize.Installer
17.3.3.11

File size:
603 KB (617,488 bytes)

Product version:
1.1.5.26

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\image lineflstudioproduceredition12.0.2__6629_i1535058309_il14188.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
2/23/2015 7:00:00 AM

Valid to:
2/24/2016 6:59:59 AM

Subject:
CN="LLC ""HALKON PLYUS""", O="LLC ""HALKON PLYUS""", STREET="Brody, house 60", L=Ternopil, S=Ternopilska, PostalCode=46010, C=UA

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00DB146CEBBA591269C2AFDE437524C41C

File PE Metadata
Compilation timestamp:
6/9/2015 9:54:21 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

Entry address:
0xA702

Entry point:
E8, 7B, 2B, 00, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 56, 8B, 75, 08, 83, FE, E0, 77, 6F, 53, 57, A1, 08, AA, 37, 00, 85, C0, 75, 1D, E8, 76, 15, 00, 00, 6A, 1E, E8, CC, 15, 00, 00, 68, FF, 00, 00, 00, E8, 1E, 18, 00, 00, A1, 08, AA, 37, 00, 59, 59, 85, F6, 74, 04, 8B, CE, EB, 03, 33, C9, 41, 51, 6A, 00, 50, FF, 15, 64, 20, 37, 00, 8B, F8, 85, FF, 75, 26, 6A, 0C, 5B, 39, 05, 20, AD, 37, 00, 74, 0D, 56, E8, 62, 02, 00, 00, 59, 85, C0, 75, A9, EB, 07, E8, 77, 1F, 00, 00, 89, 18, E8, 70, 1F, 00, 00, 89, 18, 8B...
 
[+]

Code size:
67 KB (68,608 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-230-149-48.sin2.r.cloudfront.net  (54.230.149.48:80)

TCP (HTTP):
Connects to server-54-230-95-194.fra2.r.cloudfront.net  (54.230.95.194:80)

TCP (HTTP SSL):
Connects to server-54-230-149-231.sin2.r.cloudfront.net  (54.230.149.231:443)

TCP (HTTP):
Connects to server-54-230-149-194.sin2.r.cloudfront.net  (54.230.149.194:80)

TCP (HTTP SSL):
Connects to server-54-230-149-122.sin2.r.cloudfront.net  (54.230.149.122:443)

TCP (HTTP):
Connects to ec2-54-243-162-153.compute-1.amazonaws.com  (54.243.162.153:80)

TCP (HTTP):
Connects to 131.subnet180-250-66.speedy.telkom.net.id  (180.250.66.131:80)