flashplayer_updater.exe

Deepwell

The application flashplayer_updater.exe by Deepwell has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Tomorrow Software Installer installer. The installer is marketed through download protals and search ads as the free Adobe Flash Player but will also install additional software offers which include adware, PUPs and browser toolbars.
Publisher:
Advanced Authorized Software Installer  (signed by Deepwell)

Product:
Advanced Authorized Software Installer

Version:
14.9.2.5457

MD5:
01fbbe3b021a5a9d0b9854e9c74d1518

SHA-1:
e227e250b4cbf1436fafff755d7ae26382db6526

SHA-256:
2b91108512a46152955c07610c20bcd876b234cedc76dc65a7b75a7a002124cb

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
11/30/2024 8:36:53 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.TomorrowSoftware (M)
17.2.4.7

File size:
875.4 KB (896,416 bytes)

Product version:
14.9.2.5457

Copyright:
Copyright (C) 2015

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Tomorrow Software Installer

Language:
English (United States)

Common path:
C:\users\{user}\downloads\flashplayer_updater.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
6/23/2015 8:00:00 PM

Valid to:
6/23/2016 7:59:59 PM

Subject:
CN=Deepwell, O=Deepwell, L=San Francisco, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
488ADA17990AFCA281EEF4BF17030B5C

File PE Metadata
Compilation timestamp:
7/12/2014 4:25:38 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

Entry address:
0xC822

Entry point:
E8, 3C, 05, 00, 00, E9, 57, FD, FF, FF, CC, CC, CC, CC, 51, 8D, 4C, 24, 04, 2B, C8, 1B, C0, F7, D0, 23, C8, 8B, C4, 25, 00, F0, FF, FF, 3B, C8, 72, 0A, 8B, C1, 59, 94, 8B, 00, 89, 04, 24, C3, 2D, 00, 10, 00, 00, 85, 00, EB, E9, 8B, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A3, A8, 4B, 41, 00, 89, 0D, A4, 4B, 41, 00, 89, 15, A0, 4B, 41, 00, 89, 1D, 9C, 4B, 41, 00, 89, 35, 98, 4B, 41, 00, 89, 3D, 94, 4B, 41, 00, 66, 8C, 15, C0, 4B, 41, 00, 66, 8C, 0D, B4, 4B, 41, 00, 66, 8C, 1D, 90, 4B, 41, 00, 66, 8C, 05, 8C...
 
[+]

Entropy:
7.9572  (probably packed)

Code size:
51.5 KB (52,736 bytes)

Remove flashplayer_updater.exe - Powered by Reason Core Security