flashplayer_updater.exe

Deepwell

The application flashplayer_updater.exe by Deepwell has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Tomorrow Software Installer installer. The installer is marketed through download protals and search ads as the free Adobe Flash Player but will also install additional software offers which include adware, PUPs and browser toolbars. It is also typically executed from an Internet Explorer cache folder.
Publisher:
Clear Cutting-edge Installer  (signed by Deepwell)

Product:
Clear Cutting-edge Installer

Version:
2.8.8.3577

MD5:
eb99edf232b105abfcc527ab4d21a364

SHA-1:
8385ae0bf89ce07a3d3209fa3b162f368ed6ed2c

SHA-256:
7ea904abbf082c5b08d2f003b9ca61e21b794035f8b3655ad62b96b5c33136ab

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
11/30/2024 8:31:27 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.TomorrowSoftware (M)
17.1.28.8

File size:
879.5 KB (900,576 bytes)

Product version:
2.8.8.3577

Copyright:
Copyright (C) 2015

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Tomorrow Software Installer

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\microsoft\windows\temporary internet files\content.ie5\{random}\flashplayer_updater.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
6/23/2015 8:00:00 PM

Valid to:
6/23/2016 7:59:59 PM

Subject:
CN=Deepwell, O=Deepwell, L=San Francisco, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
488ADA17990AFCA281EEF4BF17030B5C

File PE Metadata
Compilation timestamp:
7/14/2014 9:32:57 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

Entry address:
0xD022

Entry point:
E8, 3C, 05, 00, 00, E9, 57, FD, FF, FF, CC, CC, CC, CC, 51, 8D, 4C, 24, 04, 2B, C8, 1B, C0, F7, D0, 23, C8, 8B, C4, 25, 00, F0, FF, FF, 3B, C8, 72, 0A, 8B, C1, 59, 94, 8B, 00, 89, 04, 24, C3, 2D, 00, 10, 00, 00, 85, 00, EB, E9, 8B, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A3, 38, 5C, 41, 00, 89, 0D, 34, 5C, 41, 00, 89, 15, 30, 5C, 41, 00, 89, 1D, 2C, 5C, 41, 00, 89, 35, 28, 5C, 41, 00, 89, 3D, 24, 5C, 41, 00, 66, 8C, 15, 50, 5C, 41, 00, 66, 8C, 0D, 44, 5C, 41, 00, 66, 8C, 1D, 20, 5C, 41, 00, 66, 8C, 05, 1C...
 
[+]

Entropy:
7.9565  (probably packed)

Code size:
53.5 KB (54,784 bytes)

Remove flashplayer_updater.exe - Powered by Reason Core Security