abiword-setup.exe

Download Admin

This is the Tightrope WebInstall which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application abiword-setup.exe by Download Admin has been detected as adware by 15 anti-malware scanners. The program is a setup application that uses the Tightrope WebInstall installer. The file has been seen being downloaded from files5.uberdownloads.net.
Publisher:
Download Admin  (signed and verified)

MD5:
2310928d4194fea0ea5fca0311f8f1df

SHA-1:
d3209ed626136751ef58d4e842e9410f740ab829

SHA-256:
96c7591114178230f9c509fe92093c0bef3b41f84935a8146e8e5591d0cd9a57

Scanner detections:
15 / 68

Status:
Adware

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
4/19/2024 6:54:56 PM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
Riskware.Agent
7.1.1

Avira AntiVirus
ADWARE/Adware.Gen
7.11.30.172

AVG
Generic
2015.0.3354

Dr.Web
Adware.DAdmin.151
9.0.1.0255

ESET NOD32
Win32/DownloadAdmin.G potentially unwanted application
8.7.0.302.0

Fortinet FortiGate
Riskware/DownloadAdmin
11/6/2014

F-Secure
Adware:W32/WebInstallBundle
11.2014-12-09_6

K7 AntiVirus
Adware
13.183.13345

Malwarebytes
PUP.Optional.DownloadAdmin
v2014.09.12.08

McAfee
Artemis!5726256FCFA7
5600.6954

Reason Heuristics
PUP.Installer.DownloadAdmin.N
14.9.12.8

Sophos
Download Admin
4.98

Trend Micro House Call
Suspicious_GEN.F47V0706
7.2.310

VIPRE Antivirus
Threat.4783369
31208

File size:
916.3 KB (938,288 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Tightrope WebInstall (using Nullsoft Install System)

Language:
Language Neutral

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
3/19/2013 8:00:00 PM

Valid to:
5/29/2016 7:59:59 PM

Subject:
CN=Download Admin, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Download Admin, L=SAN FRANCISCO, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
2EEB247A8F9D63D74CE7EF9551E3D401

File PE Metadata
Compilation timestamp:
6/17/2014 11:35:36 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:OxpJMyVWJ0q4kfS6wKhmcRf6vEh7+KAFgtp51idtDWEqOWtVr2/NoPH48:6panJ0ZkKIh7mFgfidtDWEn20/No

Entry address:
0x3341

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, B0, 73, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, C0, 70, 40, 00, 53, FF, 15, 88, 72, 40, 00, 6A, 08, A3, F8, 24, 7A, 00, E8, 2C, 25, 00, 00, 53, 68, 60, 01, 00, 00, A3, 00, 24, 7A, 00, 8D, 44, 24, 38, 50, 53, 68, 43, 74, 40, 00, FF, 15, 64, 71, 40, 00, 68, 38, 74, 40, 00, 68, 00, 1C, 7A, 00, E8, 1D, 24, 00, 00, FF, 15, BC, 70, 40, 00, 50, BF, 00, 80, 7A, 00, 57, E8, 0B, 24, 00, 00...
 
[+]

Entropy:
7.5077

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

The file abiword-setup.exe has been seen being distributed by the following URL.

Remove abiword-setup.exe - Powered by Reason Core Security