RAM Security Center
Product: FLVMPlayer
Description:FLVMPlayer
Download RAM Free Antivirus from here and remove threats from your device.
This page contains important information about security vulnerabilities that may affect specific versions of FLVMPlayer products. Use this information to take corrective action to protect yourself from threats; in our effort to serve you better, you can also contact us for future advice related to FLVMPlayer
File information
Name md5 Machine Size Of Optional Header Characteristics Major Linker Version Minor Linker Version Size Of Code Size Of Initialized Data Size Of Uninitialized Data Address Of Entry Point Base Of Code Base Of Data Image Base Section Alignment File Alignment Major Operating System Version Minor Operating System Version Major Image Version Minor Image Version Major Subsystem Version Minor Subsystem Version Size Of Image Size Of Headers Check Sum Subsystem Dll Characteristics Size Of Stack Reserve Size Of Stack Commit Size Of Heap Reserve Size Of Heap Commit Loader Flags Number Of Rva And Sizes Sections Nb Sections Mean Entropy Sections Min Entropy Sections Max Entropy Sections Mean Raw size Sections Min Raw size Section Max Raw size Sections Mean Virtual size Sections Min Virtual size Section Max Virtual size Imports Nb DLL Imports Nb Imports Nb Ordinal Export Nb Resources Nb Resources Mean Entropy Resources Min Entropy Resources Max Entropy Resources Mean Size Resources Min Size Resources Max Size Load Configuration Size Version Information Size legitimate |
00893b9921c2f05422a42ccd84c62f1f 00893b9921c2f05422a42ccd84c62f1f 332 224 783 2 22 35328 20480 109568 17191 4096 40960 4194304 4096 512 4 0 6 0 4 0 233472 1024 303734 2 32768 2097152 4096 1048576 4096 0 16 7 3.293488849 0 5.973872432 9874.285714 0 35328 30458.28571 140 109520 8 155 0 0 9 3.772890418 2.488246328 6.426006641 1916.555556 48 9640 0 12 0 |
Detection Report
We Tested and Compared with all other Antivirus remarks for Windows Compatibility DLL.
Antiy-AVL | Trojan/Win32.TSGeneric |
Avast | NSIS:Morstar-B [PUP] |
AVG | Skodna.Generic.AMG |
Avira (no cloud) | PUA/Solimba.Gen |
AVware | DownloadMR (fs) |
CAT-QuickHeal | PUA.Bechirosl.Gen |
Comodo | Application.Win32.Solimba.L |
CrowdStrike Falcon | Malicious_confidence_100% (D) |
DrWeb | Trojan.Solimba.37 |
Emsisoft | Application.InstallWrap (A) |
Endgame | Malicious (high Confidence) |
ESET-NOD32 | MSIL/Solimba Potentially Unwanted |
Fortinet | Adware/Solimba |
GData | Win32.Application.Solimba.I |
Ikarus | PUA.Bechiro |
K7AntiVirus | Unwanted-Program ( 004940e11 ) |
K7GW | Unwanted-Program ( 004940e11 ) |
Kaspersky | Not-a-virus:Downloader.Win32.Solimba.b |
Malwarebytes | PUP.Optional.Solimba |
McAfee | Artemis!00893B9921C2 |
McAfee-GW-Edition | BehavesLike.Win32.Downloader.dc |
NANO-Antivirus | Trojan.Win32.Solimba.dvsthv |
Palo Alto Networks | Generic.ml |
Panda | Adware/Firseria |
Qihoo-360 | HEUR/QVM20.1.Malware.Gen |
Rising | PUA.FirseriaInstaller@CV!1.5C42 (cloud:Pi2iypzpmWF) |
SentinelOne (Static ML) | Static Engine – Malicious |
Sophos | Solimba Installer (PUA) |
Sophos ML | Virus.win32.sality.at |
SUPERAntiSpyware | PUP.Solimba/Variant |
Symantec | Trojan.Gen.8!cloud |
Tencent | Win32.Trojan.Falsesign.Dbd |
TrendMicro | TROJ_GEN.R047C0FDS17 |
TrendMicro-HouseCall | TROJ_GEN.R047C0FDS17 |
VBA32 | Signed-Downware.Morstar.BechiroSL |
VIPRE | DownloadMR (fs) |
Webroot | Pua.Solimba |
Yandex | PUA.Solimba! |
Zillya | Adware.BrowseFoxGen.Win32.39 |
ZoneAlarm by Check Point | Not-a-virus:Downloader.Win32.Solimba.b |
Ad-Aware | Not detected |
AegisLab | Not detected |
AhnLab-V3 | Not detected |
ALYac | Not detected |
Arcabit | Not detected |
BitDefender | Not detected |
ClamAV | Not detected |
CMC | Not detected |
Cyren | Not detected |
eScan | Not detected |
F-Prot | Not detected |
F-Secure | Not detected |
Jiangmin | Not detected |
Kingsoft | Not detected |
Microsoft | Not detected |
nProtect | Not detected |
TheHacker | Not detected |
TotalDefense | Not detected |
ViRobot | Not detected |
Zoner | Not detected |
Alibaba | Unable to process file type |
Symantec Mobile Insight | Unable to process file type |
Trustlook | Unable to process file type |
WhiteArmor | Unable to process file type |
TotalDefense | Not detected |
TrendMicro | Not detected |
TrendMicro-HouseCall | Not detected |
ViRobot | Not detected |
Webroot | Not detected |
Zoner | Not detected |
Avast-Mobile | Unable to process file type |
BitDefenderFalx | Unable to process file type |
Symantec Mobile Insight | Unable to process file type |
Trapmine | Unable to process file type |
FLV MPlayer is an ad-supported web browser plug-in (users may see additional banners, searches, pop-ups, pop-unders, interstitial and in-text links) for Internet Explorer, Firefox, and Chrome, and is distributed through various monetization platforms. during installation. FLV MPlayer is usually added when you install some other freeware (video recording/streaming, download managers or PDF creators) that had this adware bundled in its installation. When you install these free programs, they also install FLV MPlayer. Some of the programs known to bundle FLV MPlayer include “Youtube Downloader HD”, “Fast Free Converter”, “Video Media Player 1.1” and “DVDX Player 3.2”. Very often, users have no idea where it comes from, so it’s no surprise that most of them assume that FLV MPlayer is a virus.
When installed on a computer, FLV MPlayer will display banner ads on the web pages you visit, and when you browse the Internet, it will display coupons and other offers available on different websites.
The FLV MPlayer adware infection is designed specifically to make money. It generates web traffic, collects leads for other dubious sites and displays advertisements and sponsored links in your web browser.
FLV MPlayer is technically not a virus, but it has many malicious traits, such as rootkit abilities to deeply cling to the operating system, browser hijacking, and just general interference with the user experience. The industry usually refers to it as a “PUP” or potentially unwanted program.