uddownload.tmp

Setup©

Volonet Ltd

The installer utilizes the installCore download manager which may bundle additional offers for various ad-supported toolbars, extensions and utilities. The file uddownload.tmp, “Setup ” by Volonet has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the installCore installer. It is also typically executed from the user's temporary directory.
Publisher:
Setup ©   (signed by Volonet Ltd)

Product:
Setup©

Description:
Setup

Version:
1, 0, 0, 1

MD5:
9ced14514ead0fc7e0d31ec52d4c6cf4

SHA-1:
9a596fce50e51a559ff1329722946e121782bd6f

SHA-256:
edb48afd4f0573464311a3b077f8b9ca367c333cf35239f997f8c8730747547e

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
11/5/2024 2:23:58 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP (M)
16.11.17.22

File size:
1.6 MB (1,669,208 bytes)

Product version:
1, 0, 0, 1

Bundler/Installer:
installCore

Common path:
C:\users\{user}\appdata\local\temp\uddownload.tmp

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
1/10/2012 7:30:00 PM

Valid to:
11/25/2013 7:59:59 PM

Subject:
CN=Volonet Ltd, O=Volonet Ltd, STREET=hazfira 19, L=Tel Aviv, S=Israel, PostalCode=67778, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00D9EB879A7F4ADB713BB56F5D9EA449DA

File PE Metadata
Compilation timestamp:
6/19/1992 6:22:17 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
24576:H92JVcVepv0s+/nKSBuYpIurxeNGD1KH+wk2Wp8Q0TzD:H92Wepss+/nEYpIKUGZKH+pHpl23

Entry address:
0x53F78

Entry point:
55, 8B, EC, 83, C4, F0, B8, 48, 03, 41, 00, E8, 3A, F1, FF, FF, E6, B8, E4, 65, 47, 00, E8, 89, F8, FF, FF, B8, F4, 65, 47, 00, E8, 7F, F8, FF, FF, B8, 20, 66, 47, 00, E8, 75, F8, FF, FF, A1, DC, 65, 47, 00, 85, C0, 74, 17, 8B, 10, 89, 15, DC, 65, 47, 00, 50, E8, D6, F7, FF, FF, A1, DC, 65, 47, 00, 85, C0, 75, E9, 33, C0, 5A, 59, 59, 64, 89, 10, 68, F5, 1B, 40, 00, 80, 3D, 49, 60, 47, 00, 00, 74, 0A, 68, C4, 65, 47, 00, E8, D5, F7, FF, FF, 68, C4, 65, 47, 00, E8, D3, F7, FF, FF, C3, E9, A5, 20, 00, 00, EB...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
361 KB (369,664 bytes)

Remove uddownload.tmp - Powered by Reason Core Security