setup.exe

Download Manager

It uses the Air Installer distribution platform (a pay-per-install monetization download manager) to bundle unwanted software such as adware and browser toolbars during setup. The application setup.exe by Download Manager has been detected as adware by 27 anti-malware scanners. The program is a setup application that uses the AirInstaller Download Manager installer. The file has been seen being downloaded from files.getdownloadsnow.com.
Publisher:
Download Manager  (signed and verified)

Product:
Download Manager

Version:
2.5.0.42

MD5:
3edd991d1805c71b89f46bdac8205cbd

SHA-1:
89b8bbaf0b76366018d9499eeafa624d0040869e

SHA-256:
e5c8a0b21fa54031b508f135287b3d6b941820e2f73025bc0bd199b55c077ce9

Scanner detections:
27 / 68

Status:
Adware

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
11/24/2024 2:38:58 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Symmi.49926
358

Agnitum Outpost
PUA.AirAd
7.1.1

AhnLab V3 Security
PUP/Win32.Installer
2014.12.26

Avira AntiVirus
ADWARE/Adware.Gen
7.11.167.196

avast!
Win32:Malware-gen
2014.9-160212

AVG
Generic
2017.0.2836

Bitdefender
Gen:Variant.Symmi.49926
1.0.20.215

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Airadinstaller-457
0.98/19908

Dr.Web
Adware.Downware.9668
9.0.1.043

Emsisoft Anti-Malware
Gen:Variant.Adware.Symmi.49926
8.16.02.12.02

ESET NOD32
Win32/AirAdInstaller.E potentially unwanted application
10.7.0.302.0

F-Secure
Gen:Variant.Adware.Symmi.49926
11.2016-12-02_6

G Data
Gen:Variant.Symmi.49926
16.2.24

IKARUS anti.virus
AdWare.AirAdInstaller
t3scan.1.8.5.0

K7 AntiVirus
Unwanted-Program
13.1814525

Kaspersky
not-a-virus:AdWare.Win32.AirAdInstaller
14.0.0.674

Malwarebytes
PUP.Optional.AirAdInstaller
v2016.02.12.02

McAfee
Trojan.Artemis!757FB24A0964
5600.6492

MicroWorld eScan
Gen:Variant.Symmi.49926
17.0.0.129

NANO AntiVirus
Riskware.Win32.AirAdInstaller.dlqckn
0.30.0.64448

Panda Antivirus
Generic Suspicious
16.02.12.02

Reason Heuristics
PUP.Air Software.DownloadManager.Bundler (M)
16.2.12.2

Rising Antivirus
PE:PUF.Airinstall!1.9C4C
23.00.65.16210

Vba32 AntiVirus
AdWare.AirAdInstaller
3.12.26.3

VIPRE Antivirus
Iminent
32296

Zillya! Antivirus
Adware.AirAdInstaller.Win32.771
2.0.0.2024

File size:
1 MB (1,080,656 bytes)

Product version:
2.5.0.42

Copyright:
(c) Download Manager

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
AirInstaller Download Manager

Language:
English (United States)

Common path:
C:\users\{user}\downloads\setup.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
6/9/2014 9:00:00 PM

Valid to:
7/11/2017 8:59:59 PM

Subject:
CN=Download Manager, O=Download Manager, L=Victoria, S=British Columbia, C=CA

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
6771A39C2739AF7082C1C8D8234BB168

File PE Metadata
Compilation timestamp:
3/2/2015 2:41:07 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
24576:5iqr/tl57nqplxTAJaAFJglaKJDnduj2NbL+J8Bt88THX922jxRWd:5hr/zQplp4vgMOndugaeBt88DX4Am

Entry address:
0x351A50

Entry point:
60, BE, 00, 30, 65, 00, 8D, BE, 00, E0, DA, FF, 57, 83, CD, FF, EB, 10, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 75, D1, F8, 89...
 
[+]

Packer / compiler:
UPX 2.90LZMA

The file setup.exe has been seen being distributed by the following URL.

Remove setup.exe - Powered by Reason Core Security