installer.exe

Downloadcentral ApS

The installer utilizes the installCore download manager which may bundle additional offers for various ad-supported toolbars, extensions and utilities. The application installer.exe by Downloadcentral ApS has been detected as adware by 5 anti-malware scanners. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. The file has been seen being downloaded from www.downloadcentral.pl.
Publisher:
Downloadcentral ApS  (signed and verified)

MD5:
cf5d6c2d7c21602b5a1e3d3eb6c49a2c

SHA-1:
6bd257b6c59a0e952446afdeab809427eeb424a3

SHA-256:
a6689c0dab9914676b0b05d97660150a8e5480d411ff8d62fca32992afcd5fc4

Scanner detections:
5 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/27/2024 5:24:31 AM UTC  (today)

Scan engine
Detection
Engine version

Dr.Web
Adware.InstallCore.75
9.0.1.05190

ESET NOD32
Win32/InstallCore.AW potentially unwanted application
8.0.319.0

F-Prot
W32/InstallCore.P.gen
4.6.5.141

Reason Heuristics
PUP.installCore.Download (M)
16.3.28.22

VIPRE Antivirus
Threat.4788237
47848

File size:
1.1 MB (1,103,488 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore

Common path:
C:\users\{user}\downloads\installer.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
7/10/2012 12:00:00 AM

Valid to:
7/10/2013 11:59:59 PM

Subject:
CN=Downloadcentral ApS, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Downloadcentral ApS, L=Odense, S=Odense, C=DK

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
3E0CD42145109655AB37716301DF2ABC

File PE Metadata
Compilation timestamp:
6/20/1992 12:22:17 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
24576:rW1uiwEaCkZQoH/tvWQTl2x7qp9yAwKxAqgXC1Ktgid:rZiwEK5zJJsg

Entry address:
0xCD4A0

Entry point:
55, 8B, EC, 83, C4, F0, B8, 4C, 8C, 41, 00, E8, B9, FB, FF, FF, 25, F0, B1, 47, 00, 8B, C0, FF, 25, EC, B1, 47, 00, 8B, C0, FF, 25, E8, B1, 47, 00, 8B, C0, FF, 25, 5C, B1, 47, 00, 8B, C0, FF, 25, 58, B1, 47, 00, 8B, C0, FF, 25, 00, B2, 47, 00, 8B, C0, FF, 25, FC, B1, 47, 00, 8B, C0, FF, 25, F8, B1, 47, 00, 8B, C0, FF, 25, 54, B1, 47, 00, 8B, C0, FF, 25, 50, B1, 47, 00, 8B, C0, FF, 25, 4C, B1, 47, 00, 8B, C0, 53, 83, C4, BC, BB, 0A, 00, 00, 00, 54, E8, 61, FF, FF, FF, F6, 44, 24, 2C, 01, 74, 05, 0F, B7, 5C...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
837.5 KB (857,600 bytes)

The file installer.exe has been seen being distributed by the following URL.

Remove installer.exe - Powered by Reason Core Security