لم يتم تأكيده 332625.torchdownload

Web

Setup Delivery (Fried Cookie Ltd.)

The Fried Cookie installer utilizes the InstallCore download manager which may bundle additional offers for various ad-supported toolbars, extensions and utilities. The file لم يتم تأكيده 332625.torchdownload, “Web Setup ” by Setup Delivery (Fried Cookie) has been detected as adware by 18 anti-malware scanners. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions.
Publisher:
Setup Delivery (Fried Cookie Ltd.)  (signed and verified)

Product:
Web

Description:
Web Setup

MD5:
6358c157a6d3bfe92d3e81492b71001b

SHA-1:
f6519bbf7f7dd7461c6a11b2d38e77ab344585b7

SHA-256:
25c7ade6ec9142bd2ab3b980f8640f717ccdc604467ffcedc9acce21e7ad055f

Scanner detections:
18 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/25/2024 4:50:51 PM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.InstallCore
7.1.1

Avira AntiVirus
Adware/InstallCo.zlz
7.11.205.142

AVG
Generic
2016.0.3167

Baidu Antivirus
Adware.Win32.InstallCore
4.0.3.15318

Bkav FE
W32.HfsAdware
1.3.0.6379

Comodo Security
Application.Win32.FriedCookie.CIRK
20868

Dr.Web
Trojan.InstallCore.49
9.0.1.077

ESET NOD32
Win32/InstallCore.XS potentially unwanted application
9.7.0.302.0

G Data
Win32.Application.InstallCore.DI
15.3.25

K7 AntiVirus
Unwanted-Program
13.203.15866

Malwarebytes
v2015.06.24.06

NANO AntiVirus
Riskware.Win32.InstallCore.dnajwn
0.30.24.1357

Qihoo 360 Security
Win32/Virus.Adware.94c
1.0.0.1015

Reason Heuristics
PUP.Installer.InstallCore.Installer
15.4.11.23

Sophos
PUA 'Install Core'
5.14

Total Defense
Win32/Tnega.JMMQZQD
37.1.62.1

VIPRE Antivirus
Threat.4150696
39676

File size:
741.8 KB (759,608 bytes)

Product version:
3.8

Bundler/Installer:
installCore (using Inno Setup)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\?? ??? ?????? 332625.torchdownload

Digital Signature
Authority:
GlobalSign nv-sa

Valid from:
1/14/2015 9:44:35 AM

Valid to:
1/15/2016 9:44:35 AM

Subject:
CN=Setup Delivery (Fried Cookie Ltd.), O=Setup Delivery (Fried Cookie Ltd.), L=Tel Aviv, C=IL

Issuer:
CN=GlobalSign CodeSigning CA - G2, O=GlobalSign nv-sa, C=BE

Serial number:
11210A6522A1A7E7C584A5E3B94F933EE6EA

File PE Metadata
Compilation timestamp:
6/20/1992 1:22:17 AM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:quFa+fpe7ITfOoDiZ2O5mxnrzlQ4R8iRZMHNuWDc2TbQYUT9xjKCl8++v:quF7fpe7upDiOxr5g6MHJQSbc2Cl8p

Entry address:
0x9C40

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, 86, 94, FF, FF, E8, 8D, A6, FF, FF, E8, 1C, A9, FF, FF, E8, BF, A9, FF, FF, E8, 5E, C9, FF, FF, E8, C9, F2, FF, FF, E8, 30, F4, FF, FF, 33, C0, 55, 68, FC, A2, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, C5, A2, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 96, FE, FF, FF, E8, C9, FA, FF, FF, 8D, 55, F0, 33, C0, E8, 83, CF, FF, FF, 8B, 55, F0, B8, 24, CE, 40, 00, E8, 32, 95, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, 24, CE...
 
[+]

Entropy:
7.8816

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
37 KB (37,888 bytes)

The file لم يتم تأكيده 332625.torchdownload has been seen being distributed by the following URL.