chrome-update.exe

Sanflex

This is the Tightrope WebInstall which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application chrome-update.exe by Sanflex has been detected as adware by 21 anti-malware scanners. The program is a setup application that uses the Tightrope WebInstall installer. This program installs potentially unwanted software on your PC at the same time as the software you are trying to install, without adequate consent. With this installer, users are expecting to download Google's Chrome web browser but before that occurs they may be presented with additional offers, mostly potentially unwanted software or adware.
Publisher:
Sanflex  (signed and verified)

MD5:
d2bd414bd276fb1379d6583329831d71

SHA-1:
710f1ceecdd3a568e8fa07086b061d216155ddbb

SHA-256:
ca438939e49c9a6857b9eaa5fc98d8a92e673a280ebd01d8cfd517fa788c769f

Scanner detections:
21 / 68

Status:
Adware

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
11/26/2024 11:18:15 PM UTC  (a few moments ago)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Bundler.KJ
6475475

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
PUP/Win32.Downware
2015.02.07

Avira AntiVirus
ADWARE/Adware.Gen
7.11.208.88

AVG
Generic
2016.0.3206

Bitdefender
Application.Bundler.KJ
1.0.20.185

Clam AntiVirus
Win.Adware.Downloadadmin
0.98/21511

Comodo Security
Application.Win32.DownloadAdmin.ANGL
20989

Dr.Web
Adware.Downware.2220
9.0.1.05190

Emsisoft Anti-Malware
Application.Bundler.KJ
9.0.0.4799

ESET NOD32
Win32/DownloadAdmin.H potentially unwanted application
7.0.302.0

F-Prot
W32/S-4234b123
v6.4.7.1.166

F-Secure
Adware:W32/WebInstallBundle
5.13.68

G Data
Application.Bundler.KJ
15.2.25

K7 AntiVirus
Unwanted-Program
13.193.14894

Malwarebytes
PUP.Optional.DownloadAdmin
v2015.02.06.08

MicroWorld eScan
Application.Bundler.KJ
16.0.0.111

NANO AntiVirus
Riskware.Win32.Downware.djahkt
0.30.0.65070

Reason Heuristics
PUP.Tightrope.Bundler
15.5.3.0

Vba32 AntiVirus
Downloader.Agent
3.12.26.3

VIPRE Antivirus
Threat.4783369
37240

File size:
822.3 KB (842,064 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Tightrope WebInstall (using Nullsoft Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\chrome-update.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
7/21/2014 7:00:00 PM

Valid to:
7/21/2017 6:59:59 PM

Subject:
CN=Sanflex, O=Sanflex, L=SAN FRANCISCO, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
42D7699269B5BB95341F5DA022F6E57D

File PE Metadata
Compilation timestamp:
7/15/2014 11:29:31 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:oxpJfslZtuaVd9lpmhwQbift489IVGD4xJFl6Xqb5Kbmkg8SUd:sp9sVuaVdvgVbmgGDijyikg5s

Entry address:
0x3345

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, B0, 73, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, C0, 70, 40, 00, 53, FF, 15, 88, 72, 40, 00, 6A, 08, A3, B8, 3C, 42, 00, E8, 2E, 25, 00, 00, 53, 68, 60, 01, 00, 00, A3, C0, 3B, 42, 00, 8D, 44, 24, 38, 50, 53, 68, 43, 74, 40, 00, FF, 15, 64, 71, 40, 00, 68, 38, 74, 40, 00, 68, C0, 33, 42, 00, E8, 1F, 24, 00, 00, FF, 15, BC, 70, 40, 00, 50, BF, 00, 90, 42, 00, 57, E8, 0D, 24, 00, 00...
 
[+]

Entropy:
7.4900

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The file chrome-update.exe has been seen being distributed by the following URL.

Remove chrome-update.exe - Powered by Reason Core Security