office toolkit 2 5 2 downloader.zip
The file office toolkit 2 5 2 downloader.zip has been detected as a potentially unwanted program by 23 anti-malware scanners. It bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install. The file has been seen being downloaded from www.mybestmediadownloadsnow.com.
File name:
office toolkit 2 5 2 downloader.zip
MD5:
63b25b96ea30e0de19653ddd3c12a79e
SHA-1:
b65efd8c5e04999cea47a171ea55c80ac49e94e8
SHA-256:
cacd2b5ddf50ee8483bd7999ed8471c8b7438798527d1ec175b7c7331ef6ea9a
Scanner detections:
23 / 68
Status:
Potentially unwanted
Analysis date:
5/17/2025 4:13:10 PM UTC (today)
Scan engine
Detection
Engine version
Lavasoft Ad-Aware
Gen:Variant.Application.Jatif.103
6200947
Agnitum Outpost
PUA.Agent
7.1.1
Avira AntiVirus
ADWARE/Adware.Gen2
3.6.1.96
Bitdefender
Gen:Variant.Application.Jatif.103
1.0.20.465
Comodo Security
ApplicUnwnt
21639
Dr.Web
infected with Trojan.Amonetize.1755
9.0.1.05190
Emsisoft Anti-Malware
Gen:Variant.Application.Jatif.103
9.0.0.4799
ESET NOD32
Win32/Amonetize.DU potentially unwanted application
7.0.302.0
Fortinet FortiGate
Riskware/Amonetize
4/3/2015
F-Secure
Gen:Variant.Application.Jatif
11.2015-03-04_6
G Data
Gen:Variant.Application.Jatif.103
15.4.25
IKARUS anti.virus
PUA.Amonetize
t3scan.1.8.9.0
K7 AntiVirus
Trojan
13.202.15480
McAfee
Artemis!70570A8E7EDF
5600.6806
MicroWorld eScan
Gen:Variant.Application.Jatif.103
16.0.0.279
NANO AntiVirus
Riskware.Win32.Amonetize.dnxpov
0.30.8.659
Panda Antivirus
PUP/MultiToolbar.A
15.04.03.02
Qihoo 360 Security
Trojan.Generic
1.0.0.1015
Sophos
PUA 'Amonetize'
5.12
Trend Micro House Call
TROJ_GE.6B2371E4
7.2.93
Trend Micro
TROJ_GE.6B2371E4
10.465.03
VIPRE Antivirus
Trojan.Win32.Generic
39028
File size:
369.8 KB (378,664 bytes)
Common path:
C:\users\{user}\downloads\office toolkit 2 5 2 downloader.zip
The file office toolkit 2 5 2 downloader.zip has been seen being distributed by the following URL.