modelo rifa novo_2.exe

Asper

Maxiget Limited

This is a bundle installer which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application modelo rifa novo_2.exe by Maxiget Limited has been detected as adware by 28 anti-malware scanners. The program is a setup application that uses the New IT Desktop Setup installer.
Publisher:
C Vital  (signed by Maxiget Limited)

Product:
Asper

Description:
LeaveLoadLoud

Version:
4, 10, 25, 0

MD5:
2efc5155d377fc7614fa789abd94dcc0

SHA-1:
4435247e4f3287fd2bec369da610a90783370b93

SHA-256:
06766146c306a89cb3962952d10c775c85d7cdcc8124a31ac9cd6efcee8d1049

Scanner detections:
28 / 68

Status:
Adware

Explanation:
This is a modified installer version of the software and bundles additional offers including adware.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/27/2024 12:21:06 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.PURG
5758502

Agnitum Outpost
PUA.4Shared
7.1.1

AhnLab V3 Security
PUP/Win32.Downware
2015.06.18

Avira AntiVirus
APPL/Maxiget.P
8.3.1.6

Arcabit
Adware.PURG
1.0.0.425

avast!
Win32:FourShared-BT [PUP]
150602-1

Bitdefender
Adware.PURG
1.0.20.840

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Purg
0.98/20573

Comodo Security
Application.Win32.4shared.GSP
22480

Dr.Web
Adware.Downware.10748, Adware.Downware.9959
9.0.1.05190

Emsisoft Anti-Malware
Adware.PURG
10.0.0.5366

ESET NOD32
Win32/4Shared.AL potentially unwanted application
7.0.302.0

F-Prot
W32/S-71e1680e
v6.4.7.1.166

F-Secure
Adware.PURG
5.14.151

G Data
Adware.PURG
15.6.25

IKARUS anti.virus
PUA.4Shared
t3scan.1.9.5.0

K7 AntiVirus
Trojan
13.205.16273

McAfee
Program.4shared
17.6.569.0

MicroWorld eScan
Adware.PURG
16.0.0.504

NANO AntiVirus
Riskware.Win32.Downware.doonir
0.30.24.2086

Norman
Adware.PURG
02.06.2015 14:23:46

nProtect
Adware.PURG
15.06.17.01

Panda Antivirus
Trj/Genetic.gen
15.06.17.01

Reason Heuristics
PUP.New IT Limited.Bundler
15.6.17.13

Vba32 AntiVirus
AdWare.4Shared
3.12.26.4

VIPRE Antivirus
Threat.4150696
40786

Zillya! Antivirus
Adware.4Shared.Win32.6
2.0.0.2230

File size:
56.6 KB (57,992 bytes)

Product version:
4, 10, 25, 0

Copyright:
Conical (c)

Trademarks:
TM2-15

Original file name:
lltmoping.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
New IT Desktop Setup

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\modelo rifa novo_2.exe

Digital Signature
Signed by:

Authority:
GoDaddy.com, Inc.

Valid from:
12/11/2014 10:36:00 AM

Valid to:
8/15/2016 3:41:32 AM

Subject:
CN=Maxiget Limited, O=Maxiget Limited, L=Limassol, S=Cyprus, C=CY

Issuer:
CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US

Serial number:
2B83CBF523FA3B

File PE Metadata
Compilation timestamp:
2/26/2015 2:37:03 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
768:ta3i61W4IBzBQzhdtmWF5MIN6VSJyU4DIeLVjGYJgWx:2FbkzByhqWCSJeIeRjJg

Entry address:
0x5167

Entry point:
55, 8B, EC, 83, EC, 44, 56, FF, 15, 54, 60, 40, 00, 8B, F0, 8A, 06, 3C, 22, 74, 10, 3C, 20, 7E, 1E, 46, 80, 3E, 20, 7F, FA, EB, 16, 3C, 22, 74, 11, 46, 8A, 06, 84, C0, 75, F5, 3C, 22, 75, 07, EB, 04, 3C, 20, 7F, 07, 46, 8A, 06, 84, C0, 75, F5, 83, 65, E8, 00, 8D, 45, BC, 50, FF, 15, 30, 60, 40, 00, E8, 5B, 00, 00, 00, 68, 04, 80, 40, 00, 68, 00, 80, 40, 00, E8, 32, 00, 00, 00, F6, 45, E8, 01, 59, 59, 74, 06, 0F, B7, 45, EC, EB, 03, 6A, 0A, 58, 50, 56, 6A, 00, 6A, 00, FF, 15, 2C, 60, 40, 00, 50, E8, B7, FC...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
17 KB (17,408 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to lga15s43-in-f18.1e100.net  (74.125.226.50:443)

TCP (HTTP):

TCP (HTTP):
Connects to a23-52-149-163.deploy.static.akamaitechnologies.com  (23.52.149.163:80)

Remove modelo rifa novo_2.exe - Powered by Reason Core Security