adobe_flash_setup.exe

OOO DIGITAL VEI

The installer utilizes the installCore download manager which may bundle additional offers for various ad-supported toolbars, extensions and utilities. The application adobe_flash_setup.exe, “Generic Setup ” by OOO DIGITAL VEI has been detected as adware by 14 anti-malware scanners. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions.
Publisher:
Generic   (signed by OOO DIGITAL VEI)

Product:
Generic

Description:
Generic Setup

Version:
5.4.4.3

MD5:
6dd104b66a12c311f746253ab1854dfc

SHA-1:
32ea5ca5c11ae3c219b575f9a6814a8d35e10cc5

SHA-256:
73da9f1e603796f7f4994f68c703b2a30b4020519166ed7f6d071381368bd01f

Scanner detections:
14 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
12/25/2024 8:15:00 AM UTC  (today)

Scan engine
Detection
Engine version

avast!
Rootkit-gen [Rtk]
2014.9-160209

AVG
Adware InstallCore
2017.0.2839

Baidu Antivirus
Adware.Win32.InstallCore
4.0.3.1629

Bkav FE
W32.HfsAdware
1.3.0.6379

Comodo Security
Application.Win32.InstallCore.AYK
22326

Dr.Web
Trojan.InstallCore.639
9.0.1.040

ESET NOD32
Win32/InstallCore.ZC potentially unwanted application
10.7.0.302.0

Fortinet FortiGate
Riskware/InstallCore
2/9/2016

G Data
Win32.Application.InstallCore.EG
16.2.25

K7 AntiVirus
Adware
13.204.16131

Malwarebytes
PUP.Optional.Digital
v2016.02.09.03

Reason Heuristics
PUP.installCore.OOODIGITALVEI.Installer (M)
16.2.9.3

Vba32 AntiVirus
Malware-Cryptor.InstallCore.gen
3.12.26.4

VIPRE Antivirus
Threat.4150696
40786

File size:
778.6 KB (797,248 bytes)

Product version:
3.4.7

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\adobe_flash_setup.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
4/27/2015 2:00:00 AM

Valid to:
4/27/2016 1:59:59 AM

Subject:
CN=OOO DIGITAL VEI, OU=Software Receive Cloud, O=OOO DIGITAL VEI, STREET="UL BRATISLAVSKAYA, D 21, KORP 1", L=Moscow, S=Moscow, PostalCode=109451, C=RU

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
55CC4B91FE7FFEFF50F423E846A276D9

File PE Metadata
Compilation timestamp:
6/20/1992 12:22:17 AM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
24576:H2tO8JNrcwfqEVlcy2SWiNODDSqfk+mFoXg:HkO6rc2IfSWii+qfk+hg

Entry address:
0xA5F8

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, CE, 8A, FF, FF, E8, D5, 9C, FF, FF, E8, 64, 9F, FF, FF, E8, 07, A0, FF, FF, E8, A6, BF, FF, FF, E8, 11, E9, FF, FF, E8, 78, EA, FF, FF, 33, C0, 55, 68, C9, AC, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, 92, AC, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 26, F5, FF, FF, E8, 11, F1, FF, FF, 80, 3D, 34, B2, 40, 00, 00, 74, 0C, E8, 23, F6, FF, FF, 33, C0, E8, C4, 97, FF, FF, 8D, 55, F0, 33, C0, E8, B6, C5, FF, FF, 8B, 55...
 
[+]

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
39.5 KB (40,448 bytes)

The file adobe_flash_setup.exe has been seen being distributed by the following URL.

Remove adobe_flash_setup.exe - Powered by Reason Core Security