adobeflashplayerpluginsetup-19407963-none.exe

File.org

The installer utilizes the installCore download manager which may bundle additional offers for various ad-supported toolbars, extensions and utilities. The application adobeflashplayerpluginsetup-19407963-none.exe by File.org has been detected as a potentially unwanted program by 16 anti-malware scanners. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. With this installer, users are expecting to download the free Adobe Flash Player but before that occurs they may be presented with additional offers, mostly potentially unwanted software or adware.
Publisher:
File.org  (signed and verified)

MD5:
b9c17c44ef69653f514e6142e15cb501

SHA-1:
05b5ca6168caccc00bca7348967c74ed361a94d7

SHA-256:
ef6afb0a7792e8cbba73454db4b3d9f0e474ebcf245bba715f6fa8f4f2fcb1eb

Scanner detections:
16 / 68

Status:
Potentially unwanted

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
11/15/2024 3:51:49 PM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
PUP/Win32.InstallCore
2014.07.28

Avira AntiVirus
7.11.155.78

avast!
Adware-gen [Adw]
2014.9-140902

Clam AntiVirus
Win.Adware.Installcore-500
0.98/21411

Comodo Security
Application.Win32.Installcore.PC
18993

Dr.Web
Adware.Downware.4757
9.0.1.0245

ESET NOD32
Win32/InstallCore.PC
8.9961

Fortinet FortiGate
Riskware/InstallCore
9/2/2014

K7 AntiVirus
Unwanted-Program
13.1712436

McAfee
Artemis!B9C17C44EF69
5600.7020

Qihoo 360 Security
Win32/Virus.Adware.f22
1.0.0.1015

Reason Heuristics
PUP.Installer.Fileorg.j
14.9.2.7

Trend Micro House Call
Suspicious_GEN.F47V0614
7.2.245

Vba32 AntiVirus
3.12.26.0

VIPRE Antivirus
Threat.4150696
31208

File size:
670.8 KB (686,936 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Common path:
C:\users\{user}\downloads\adobeflashplayerpluginsetup-19407963-none.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
4/25/2014 1:00:00 AM

Valid to:
4/26/2015 12:59:59 AM

Subject:
CN=File.org, O=File.org, STREET=Bysoestrade 2B st., L=Holbaek, S=N/A, PostalCode=4300, C=DK

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00E2D23668FD70A6AD497F37619358D967

File PE Metadata
Compilation timestamp:
6/19/1992 11:22:17 PM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:yYvpWINlY/czBM/vArIudGX2YamtH8GbQIn7BcHFDVtXWqP2hgGORFCVaQ:yYvoINuW2wdGGYFtcGFnytXWqnL/jQ

Entry address:
0x9C40

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, 86, 94, FF, FF, E8, 8D, A6, FF, FF, E8, 1C, A9, FF, FF, E8, 53, C9, FF, FF, E8, 9A, C9, FF, FF, E8, C9, F2, FF, FF, E8, 30, F4, FF, FF, 33, C0, 55, 68, FC, A2, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, C5, A2, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 96, FE, FF, FF, E8, C9, FA, FF, FF, 8D, 55, F0, 33, C0, E8, 83, CF, FF, FF, 8B, 55, F0, B8, 24, CE, 40, 00, E8, 32, 95, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, 24, CE...
 
[+]

Entropy:
7.8879

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
37 KB (37,888 bytes)

The file adobeflashplayerpluginsetup-19407963-none.exe has been seen being distributed by the following 2 URLs.