flashplayer_updater.exe

Deepwell

The application flashplayer_updater.exe by Deepwell has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Tomorrow Software Installer installer. With this installer, users are expecting to download the free Adobe Flash Player but before that occurs they may be presented with additional offers, mostly potentially unwanted software or adware. The file has been seen being downloaded from files4.downloadnet1188.com.
Publisher:
Clear Cutting-edge Installer  (signed by Deepwell)

Product:
Clear Cutting-edge Installer

Version:
2.8.8.3577

MD5:
0cab3ef0a21bca27d6afbb4dfd7ebdc5

SHA-1:
8d373c66cc8461483d38b7b3608f08f242a6911b

SHA-256:
817f5cf9facde65f5b258ca464f62675d29f21ba0c48b68da05cc9245a927caa

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/28/2024 9:47:03 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.TomorrowSoftware (M)
17.2.20.4

File size:
875.4 KB (896,408 bytes)

Product version:
2.8.8.3577

Copyright:
Copyright (C) 2015

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Tomorrow Software Installer

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\microsoft\windows\inetcache\ie\{random}\flashplayer_updater.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
6/23/2015 5:00:00 PM

Valid to:
6/23/2016 4:59:59 PM

Subject:
CN=Deepwell, O=Deepwell, L=San Francisco, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
488ADA17990AFCA281EEF4BF17030B5C

File PE Metadata
Compilation timestamp:
7/18/2014 2:58:24 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

Entry address:
0xC822

Entry point:
E8, 3C, 05, 00, 00, E9, 57, FD, FF, FF, CC, CC, CC, CC, 51, 8D, 4C, 24, 04, 2B, C8, 1B, C0, F7, D0, 23, C8, 8B, C4, 25, 00, F0, FF, FF, 3B, C8, 72, 0A, 8B, C1, 59, 94, 8B, 00, 89, 04, 24, C3, 2D, 00, 10, 00, 00, 85, 00, EB, E9, 8B, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A3, A8, 4B, 41, 00, 89, 0D, A4, 4B, 41, 00, 89, 15, A0, 4B, 41, 00, 89, 1D, 9C, 4B, 41, 00, 89, 35, 98, 4B, 41, 00, 89, 3D, 94, 4B, 41, 00, 66, 8C, 15, C0, 4B, 41, 00, 66, 8C, 0D, B4, 4B, 41, 00, 66, 8C, 1D, 90, 4B, 41, 00, 66, 8C, 05, 8C...
 
[+]

Entropy:
7.9571  (probably packed)

Code size:
51.5 KB (52,736 bytes)

The file flashplayer_updater.exe has been seen being distributed by the following URL.

http://files4.downloadnet1188.com/download/.../dl?bc=1191733&pid=installmetrix&brand=installmetrix.com&aid=noads&c=supcc001_moc13a_cir9a_supcc001_supcc001wlttf_jlp2d_MSIE_noads_0803_65437hyphen8050&country=US&cb=-474730189&filename=FlashPlayer_Updater.exe&productKey=p3kz63nkp6vuvqn6le35zhqpafbck33m&osName=Windows&osVersion=8.1&browserName=IE&browserVersion=11&zTmp=1&executable=1191309

Remove flashplayer_updater.exe - Powered by Reason Core Security