setup__12149_il360562.exe

The application setup__12149_il360562.exe has been detected as a potentially unwanted program by 22 anti-malware scanners. The setup program bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install. While running, it connects to the Internet address server-54-192-54-182.jfk6.r.cloudfront.net on port 80 using the HTTP protocol.
Version:
1.1.5.90

MD5:
8a11d796c18f502ddffec6cf49433761

SHA-1:
8c04b958e7752045602a10cbb01b291a48d8a12c

SHA-256:
fa6d3a73b3c3545f211a42f88d73f97d3a3f4d1adacbaa12b6ce39136f2c55ad

Scanner detections:
22 / 68

Status:
Potentially unwanted

Analysis date:
4/19/2024 3:58:43 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Mikey.14438
5627563

Agnitum Outpost
PUA.Amonetize
7.1.1

AhnLab V3 Security
PUP/Win32.Amonetiz
2015.06.02

Avira AntiVirus
ADWARE/Amonetize.Gen7
8.3.1.6

AVG
BundleApp
2016.0.3091

Baidu Antivirus
PUA.Win32.Amonetize
4.0.3.1562

Bitdefender
Gen:Variant.Adware.Mikey.14438
1.0.20.765

Bkav FE
HW32.Packed
1.3.0.6379

Comodo Security
Application.Win32.Amonetize.DAZ
22314

Dr.Web
Trojan.Amonetize.3241
9.0.1.05190

Emsisoft Anti-Malware
Gen:Variant.Mikey.14438
10.0.0.5366

ESET NOD32
Win32/Amonetize.EW potentially unwanted application
7.0.302.0

F-Secure
Gen:Variant.Adware.Mikey
5.14.151

G Data
Gen:Variant.Adware.Mikey.14438
15.6.25

Kaspersky
not-a-virus:AdWare.Win32.Amonetize
15.0.0.543

Malwarebytes
PUP.Optional.Amonetize
v2015.06.02.11

MicroWorld eScan
Gen:Variant.Adware.Mikey.14438
16.0.0.459

NANO AntiVirus
Riskware.Win32.Amonetize.dsinog
0.30.24.1636

Norman
Gen:Variant.Adware.Mikey.14438
03.12.2014 13:20:04

Panda Antivirus
Trj/Genetic.gen
15.06.02.11

Reason Heuristics
Threat.Win.Reputation.IMP
15.6.2.11

Zillya! Antivirus
Adware.Amonetize.Win32.3796
2.0.0.2201

File size:
725 KB (742,400 bytes)

Product version:
1.1.5.90

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\setup__12149_il360562.exe

File PE Metadata
Compilation timestamp:
5/27/2015 3:04:05 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
12288:/BtUCARpFAn1MXAf92ab/9gUemMpjngN7XtyMPrnDW0JNmu1facYFs5b:/fb1N9v9gCMBglt9WwpYF0

Entry address:
0x107A6

Entry point:
E8, 61, 36, 00, 00, E9, 39, FE, FF, FF, 55, 8B, EC, A1, F8, 6A, 37, 00, 85, C0, 75, 1D, E8, 40, 21, 00, 00, 6A, 1E, E8, 96, 21, 00, 00, 68, FF, 00, 00, 00, E8, D7, 15, 00, 00, A1, F8, 6A, 37, 00, 59, 59, 8B, 4D, 08, 85, C9, 75, 01, 41, 51, 6A, 00, 50, FF, 15, 7C, A0, 36, 00, 5D, C3, 55, 8B, EC, 56, 8B, 75, 08, 83, FE, E0, 77, 6F, 53, 57, A1, F8, 6A, 37, 00, 85, C0, 75, 1D, E8, F8, 20, 00, 00, 6A, 1E, E8, 4E, 21, 00, 00, 68, FF, 00, 00, 00, E8, 8F, 15, 00, 00, A1, F8, 6A, 37, 00, 59, 59, 85, F6, 74, 04, 8B...
 
[+]

Entropy:
7.5165

Code size:
161.5 KB (165,376 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-192-55-178.jfk6.r.cloudfront.net  (54.192.55.178:80)

TCP (HTTP):
Connects to server-54-192-54-182.jfk6.r.cloudfront.net  (54.192.54.182:80)

TCP (HTTP):
Connects to ec2-54-235-95-208.compute-1.amazonaws.com  (54.235.95.208:80)

Remove setup__12149_il360562.exe - Powered by Reason Core Security