launcher__12693.exe

The application launcher__12693.exe has been detected as a potentially unwanted program by 27 anti-malware scanners. The setup program bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install. While running, it connects to the Internet address server-54-192-55-154.jfk6.r.cloudfront.net on port 80 using the HTTP protocol.
Version:
1.1.2.41

MD5:
bda75c3065a0bfdf9217df54da5fc364

SHA-1:
182ae541135db5354d1bacd30afc896c9a4072e9

SHA-256:
39f973a2ab8c234894c7a6a0ee310155ab3a0f286bc9ae134f793fb033504231

Scanner detections:
27 / 68

Status:
Potentially unwanted

Analysis date:
4/24/2024 9:51:58 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Bundler.Amonetize.BA
5743552

Agnitum Outpost
PUA.Amonetize
7.1.1

AhnLab V3 Security
PUP/Win32.Amonetize
2015.06.18

Avira AntiVirus
ADWARE/Amonetize.629248.5
8.3.1.6

Arcabit
Application.Bundler.Amonetize.BA
1.0.0.425

avast!
Win32:PUP-gen [PUP]
2014.9-150617

AVG
BundleApp
2016.0.3075

Baidu Antivirus
PUA.Win32.Amonetize
4.0.3.15617

Bitdefender
Application.Bundler.Amonetize.BA
1.0.20.840

Bkav FE
HW32.Packed
1.3.0.6379

Dr.Web
Trojan.Amonetize.3647
9.0.1.0168

Emsisoft Anti-Malware
Application.Bundler.Amonetize.BA
10.0.0.5366

ESET NOD32
Win32/Amonetize.FC potentially unwanted application
7.0.302.0

Fortinet FortiGate
Adware/Amonetize
6/17/2015

F-Secure
Riskware.Application.Bundler.Amonetize
5.14.151

G Data
Application.Bundler.Amonetize.BA
15.6.25

Kaspersky
not-a-virus:AdWare.Win32.Amonetize
15.0.0.543

Malwarebytes
PUP.Optional.Amonetize.A
v2015.06.17.04

McAfee
Artemis!BDA75C3065A0
5600.6731

MicroWorld eScan
Application.Bundler.Amonetize.BA
16.0.0.504

NANO AntiVirus
Riskware.Win32.Amonetize.dsucco
0.30.24.2086

Norman
Application.Bundler.Amonetize.BA
02.06.2015 14:23:46

Panda Antivirus
Trj/Genetic.gen
15.06.17.04

Qihoo 360 Security
Win32/Virus.Adware.4f3
1.0.0.1015

Reason Heuristics
Threat.Win.Reputation.IMP
15.6.17.16

VIPRE Antivirus
Threat.4150696
40828

Zillya! Antivirus
Adware.Amonetize.Win32.4105
2.0.0.2231

File size:
614.5 KB (629,248 bytes)

Product version:
1.1.2.41

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\launcher__12693.exe

File PE Metadata
Compilation timestamp:
6/12/2015 3:26:41 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
12288:/56qooisia7PuyaBIGTdWrjuXjlr84UsCbMu0JNmu1facYle:TRziQuy7xqw4BuwpYl

Entry address:
0xB852

Entry point:
E8, 7B, 2B, 00, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 56, 8B, 75, 08, 83, FE, E0, 77, 6F, 53, 57, A1, 08, BA, 37, 00, 85, C0, 75, 1D, E8, 76, 15, 00, 00, 6A, 1E, E8, CC, 15, 00, 00, 68, FF, 00, 00, 00, E8, 1E, 18, 00, 00, A1, 08, BA, 37, 00, 59, 59, 85, F6, 74, 04, 8B, CE, EB, 03, 33, C9, 41, 51, 6A, 00, 50, FF, 15, 78, 30, 37, 00, 8B, F8, 85, FF, 75, 26, 6A, 0C, 5B, 39, 05, 20, BD, 37, 00, 74, 0D, 56, E8, 62, 02, 00, 00, 59, 85, C0, 75, A9, EB, 07, E8, 77, 1F, 00, 00, 89, 18, E8, 70, 1F, 00, 00, 89, 18, 8B...
 
[+]

Entropy:
7.6546

Code size:
72 KB (73,728 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-230-52-163.jfk6.r.cloudfront.net  (54.230.52.163:80)

TCP (HTTP):
Connects to server-54-192-55-154.jfk6.r.cloudfront.net  (54.192.55.154:80)

TCP (HTTP):
Connects to ec2-54-225-244-105.compute-1.amazonaws.com  (54.225.244.105:80)

Remove launcher__12693.exe - Powered by Reason Core Security