microsoft office 2013 professional plus full activator crack (32.bit-64.bit)__6266_il12065.exe

The application microsoft office 2013 professional plus full activator crack (32.bit-64.bit)__6266_il12065.exe has been detected as a potentially unwanted program by 18 anti-malware scanners. This is a setup program which is used to install the application. The setup program bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install. The file has been seen being downloaded from www.conductdownload.com and multiple other hosts. While running, it connects to the Internet address 224-124-232-198.static.unitasglobal.net on port 80 using the HTTP protocol.
Version:
1.1.6.20

MD5:
74bb457d49add093d07a6d0f9ad7400f

SHA-1:
6c6cb3b052c2fabe54cf609d96996ada424dafe4

SHA-256:
7cb399457849c6bf8b27980a07f09f5cb267d8b583a46c70b0f3f70c417305db

Scanner detections:
18 / 68

Status:
Potentially unwanted

Analysis date:
6/21/2018 7:36:30 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.Amonetize
7.1.1

AhnLab V3 Security
PUP/Win32.Amonetiz
14.03.22

Avira AntiVirus
ADWARE/Adware.Gen2
7.11.138.108

avast!
Win32:Amonetize-N [PUP]
2014.9-140322

AVG
Generic_r
2015.0.3527

Baidu Antivirus
Adware.Win32.Amonetize
4.0.3.14322

Dr.Web
Adware.Downware.2250
9.0.1.081

ESET NOD32
Win32/Amonetize.AI (variant)
8.9575

Fortinet FortiGate
Riskware/Amonetize
3/22/2014

Kaspersky
not-a-virus:HEUR:AdWare.Win32.Amonetize
14.0.0.4132

Kingsoft AntiVirus
Win32.Troj.Generic.a.(kcloud)
331020.49267

Malwarebytes
PUP.Optional.Amonetize.A
v2014.03.22.12

McAfee
Artemis!74BB457D49AD
5600.7183

McAfee Web Gateway
Artemis!74BB457D49AD
7.7183

Qihoo 360 Security
Win32/Virus.Adware.932
1.0.0.1015

Sophos
Generic PUA GM
4.98

Trend Micro House Call
TROJ_GEN.R0CBH05CM14
7.2.81

VIPRE Antivirus
Trojan.Win32.Generic
27632

File size:
322 KB (329,728 bytes)

Product version:
1.1.6.20

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\microsoft office 2013 professional plus full activator crack (32.bit-64.bit)__6266_il12065.exe

File PE Metadata
Compilation timestamp:
3/20/2014 4:26:45 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
6144:ZhPJW6OtZcZiA0bUwt8Bs5oVQZG2ehKxZYU/gHNAq4p+xGxiDs8EL:ZhPJvOkZiAuUwt0s5jlZlwAqO+zs8q

Entry address:
0x26ED4

Entry point:
E8, BC, 95, 00, 00, E9, 89, FE, FF, FF, CC, CC, 53, 56, 8B, 44, 24, 18, 0B, C0, 75, 18, 8B, 4C, 24, 14, 8B, 44, 24, 10, 33, D2, F7, F1, 8B, D8, 8B, 44, 24, 0C, F7, F1, 8B, D3, EB, 41, 8B, C8, 8B, 5C, 24, 14, 8B, 54, 24, 10, 8B, 44, 24, 0C, D1, E9, D1, DB, D1, EA, D1, D8, 0B, C9, 75, F4, F7, F3, 8B, F0, F7, 64, 24, 18, 8B, C8, 8B, 44, 24, 14, F7, E6, 03, D1, 72, 0E, 3B, 54, 24, 10, 77, 08, 72, 07, 3B, 44, 24, 0C, 76, 01, 4E, 33, D2, 8B, C6, 5E, 5B, C2, 10, 00, 57, 8B, C6, 83, E0, 0F, 85, C0, 0F, 85, C1, 00...
 
[+]

Code size:
228.5 KB (233,984 bytes)

The file microsoft office 2013 professional plus full activator crack (32.bit-64.bit)__6266_il12065.exe has been seen being distributed by the following 14 URLs.

http://www.conductdownload.com/download.php?version=1.1.6.20&campid=4607&capp=FlashPlayer&prefix=install*flashplayer&ti1=MTI0M3wxNzM0fEtXfDN8MXx8|f1083ef8b33baf993d96198897c89bb7|9ae6a960-af71-11e3-a749-002590f00f96

http://www.conductdownload.com/download.php?version=1.1.6.20&prefix=Plants Vs Zombies 2 Full Crack&campid=3613&ti1=BW&instid[appname]=Plants Vs Zombies 2 Full Crack&instid[thankyoupage]=&instid[appsetupurl]=&instid[interrupted]=&instid[appimageurl]=http://s3.amazonaws.com/.../downloadall.png

http://www.singulardownload.com/download.php?version=1.1.6.20&campid=6601&instid[appname]=http://downlite.net/download/DownLiteSilent2.exe&instid[cmdline]=&instid[appimageurl]=http://downlite.net/.../Logo_150.png&prefix=The_Beatles_-_The_Complete_Discography_of_Original_Studio_Albums&instid[thankyoupage]=

http://q=http://.../1ixyG4M

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-240-160-26.iad12.r.cloudfront.net  (54.240.160.26:80)

TCP (HTTP):
Connects to server-54-230-38-34.jfk1.r.cloudfront.net  (54.230.38.34:80)

TCP (HTTP):
Connects to s3-1.amazonaws.com  (176.32.99.210:80)

TCP (HTTP):

TCP (HTTP):
Connects to ec2-54-225-181-84.compute-1.amazonaws.com  (54.225.181.84:80)

TCP (HTTP):
Connects to 224-124-232-198.static.unitasglobal.net  (198.232.124.224:80)

TCP (HTTP):
Connects to 208.185.54.187.IPYX-074089-ZYO.above.net  (208.185.54.187:80)