vlc_2.1.5.exe

Max Setup

The installer utilizes the installCore download manager which may bundle additional offers for various ad-supported toolbars, extensions and utilities. The application vlc_2.1.5.exe by Max Setup has been detected as adware by 23 anti-malware scanners. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. With this installer, users are expecting to download the VideoLAN VLC media player but before that occurs they may be presented with additional offers, mostly potentially unwanted software or adware.
Publisher:
Max Setup  (signed and verified)

MD5:
a574e805f48c66b69f22b49ff551bdb3

SHA-1:
0a75332af51ed0671a4e2b7ef98ec3cc61c85f08

SHA-256:
8c9ebeb5f72b1ffd1ac15c71f3c208d1a9848659c358bd0d5fab9ec2da12845e

Scanner detections:
23 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
11/30/2024 11:35:09 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.InstallCore
7.1.1

AhnLab V3 Security
PUP/Win32.InstallCore
2014.10.25

Avira AntiVirus
7.11.174.252

avast!
Win32:Adware-gen [Adw]
2014.9-141028

AVG
InstallCore
2015.0.3307

Baidu Antivirus
Adware.Win32.InstallCore
4.0.3.141028

Comodo Security
ApplicUnwnt
18967

Dr.Web
Trojan.Packed.24524
9.0.1.0301

ESET NOD32
Win32/InstallCore.BY (variant)
8.10477

Fortinet FortiGate
Riskware/InstallCore
10/28/2014

F-Prot
W32/InstallCore.AD.gen
v6.4.7.1.166

G Data
Win32.Application.InstallCore
14.10.24

IKARUS anti.virus
Backdoor.Win32.Hupigon
t3scan.1.7.8.0

K7 AntiVirus
Trojan
13.183.13504

Malwarebytes
v2014.10.28.07

McAfee
Artemis!A574E805F48C
5600.6963

NANO AntiVirus
Trojan.Win32.InstallCore.dfgexe
0.28.2.62286

Qihoo 360 Security
Win32/Virus.Adware.94c
1.0.0.1015

Reason Heuristics
PUP.MaxSetup.H
14.10.28.19

Trend Micro House Call
Suspicious_GEN.F47V0817
7.2.301

Vba32 AntiVirus
3.12.26.3

VIPRE Antivirus
Adware.InstallCore
33490

File size:
688.1 KB (704,576 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Common path:
C:\users\{user}\downloads\vlc_2.1.5.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
3/10/2014 8:00:00 PM

Valid to:
3/11/2015 7:59:59 PM

Subject:
CN=Max Setup, O=Max Setup, STREET=Lillienblam 28, L=Tel Aviv, S=Tel Aviv, PostalCode=651307, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
008F6F1294DBB38F9F80A7A06DE489DF45

File PE Metadata
Compilation timestamp:
6/19/1992 6:22:17 PM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:WnvpS1w3sPVESMn/QLPNPjQ6XlsZwOcmxwaxIxVdWYRJJJkXu19TDbJ:WnvUq3sdW/qjQ6X5OlwaxInddLkunPb

Entry address:
0x9C40

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, 86, 94, FF, FF, E8, 8D, A6, FF, FF, E8, 1C, A9, FF, FF, E8, 53, C9, FF, FF, E8, 9A, C9, FF, FF, E8, C9, F2, FF, FF, E8, 30, F4, FF, FF, 33, C0, 55, 68, FC, A2, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, C5, A2, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 96, FE, FF, FF, E8, C9, FA, FF, FF, 8D, 55, F0, 33, C0, E8, 83, CF, FF, FF, 8B, 55, F0, B8, 24, CE, 40, 00, E8, 32, 95, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, 24, CE...
 
[+]

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
37 KB (37,888 bytes)

The file vlc_2.1.5.exe has been seen being distributed by the following 3 URLs.

http://download.oneinstaller.com/.../?iid=636&nsoft=1

Remove vlc_2.1.5.exe - Powered by Reason Core Security