spyhuntercrackpatchpluskeygenisherelatest__15022_i1620280526_il1301.exe

LLC `FOTO-TSENTR `

The application spyhuntercrackpatchpluskeygenisherelatest__15022_i1620280526_il1301.exe by LLC `FOTO-TSENTR ` has been detected as a potentially unwanted program by 8 anti-malware scanners. It bundles adware offers using the Amonetize, a Pay-Per-Install (PPI) monetization and distribution download manager. The software offerings provided are based on the PC's geo-location at the time of install. While running, it connects to the Internet address server-205-251-251-209.jfk5.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
LLC `FOTO-TSENTR `  (signed and verified)

MD5:
795c0e0a0d5886af9ac21ce2fad0640f

SHA-1:
5fd02bdd58c7c9f4112276f092df53c78694548c

SHA-256:
bcc753b99481d88feb6b17edeeaf5ac9a3a08e4b4c7bc6ba074f45b4da92253e

Scanner detections:
8 / 68

Status:
Potentially unwanted

Analysis date:
4/23/2024 12:43:13 PM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
PUP/Win32.Amonetize
2015.09.03

Avira AntiVirus
ADWARE/Amonetize.Gen
8.3.2.2

Emsisoft Anti-Malware
Gen:Variant.Adware.Strictor.94564
8.15.09.03.02

ESET NOD32
Win32/Amonetize.HU potentially unwanted (variant)
9.12192

F-Secure
Gen:Variant.Adware.Strictor
11.2015-03-09_5

Malwarebytes
PUP.Optional.Bundle
v2015.09.03.02

Qihoo 360 Security
HEUR/QVM10.1.Malware.Gen
1.0.0.1015

Reason Heuristics
Threat.Win.Reputation.IMP
15.9.2.22

File size:
769.2 KB (787,632 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\temp\spyhuntercrackpatchpluskeygenisherelatest__15022_i1620280526_il1301.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
7/10/2015 3:00:00 AM

Valid to:
7/10/2016 2:59:59 AM

Subject:
CN=LLC `FOTO-TSENTR `, O=LLC `FOTO-TSENTR `, STREET="Bud. 13-A kv. 1, Bolshaya Morskaya", L=Mykolayiv, S=Mykolayivska, PostalCode=54001, C=UA

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
4EA3FDADC06CB2C406A598621402321B

File PE Metadata
Compilation timestamp:
9/3/2015 12:02:35 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
24576:Sb2CYlKk2nvPpPEAHQr8icyf9+SYuQFNtVZM:S6CYlKk2nvPW8icyl+NtM

Entry address:
0x16509

Entry point:
E8, 02, 49, 00, 00, E9, 39, FE, FF, FF, 55, 8B, EC, A1, 44, DE, 43, 00, 85, C0, 75, 1D, E8, 18, 23, 00, 00, 6A, 1E, E8, 6E, 23, 00, 00, 68, FF, 00, 00, 00, E8, 67, 28, 00, 00, A1, 44, DE, 43, 00, 59, 59, 8B, 4D, 08, 85, C9, 75, 01, 41, 51, 6A, 00, 50, FF, 15, 7C, 00, 43, 00, 5D, C3, 55, 8B, EC, 56, 8B, 75, 08, 83, FE, E0, 77, 6F, 53, 57, A1, 44, DE, 43, 00, 85, C0, 75, 1D, E8, D0, 22, 00, 00, 6A, 1E, E8, 26, 23, 00, 00, 68, FF, 00, 00, 00, E8, 1F, 28, 00, 00, A1, 44, DE, 43, 00, 59, 59, 85, F6, 74, 04, 8B...
 
[+]

Code size:
184.5 KB (188,928 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-230-37-203.jfk1.r.cloudfront.net  (54.230.37.203:80)

TCP (HTTP):
Connects to server-205-251-251-223.jfk5.r.cloudfront.net  (205.251.251.223:80)

TCP (HTTP):
Connects to server-205-251-251-209.jfk5.r.cloudfront.net  (205.251.251.209:80)

TCP (HTTP):
Connects to server-205-251-251-150.jfk5.r.cloudfront.net  (205.251.251.150:80)

TCP (HTTP):
Connects to ec2-54-204-40-188.compute-1.amazonaws.com  (54.204.40.188:80)