chrome-update.exe

Download Admin

This is the Tightrope WebInstall which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application chrome-update.exe by Download Admin has been detected as adware by 15 anti-malware scanners. The program is a setup application that uses the Tightrope WebInstall installer. With this installer, users are expecting to download Google's Chrome web browser but before that occurs they may be presented with additional offers, mostly potentially unwanted software or adware.
Publisher:
Download Admin  (signed and verified)

MD5:
98d3264f763c50ed69c25a16e491248c

SHA-1:
1b22c3f0ff2d345319c66c1738ea36f532019259

SHA-256:
7deffd9514b2ccfc819fba6df3373719f0bbe43033a5b2caa3c366ff17a9ca47

Scanner detections:
15 / 68

Status:
Adware

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
5/15/2024 4:44:27 PM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
Riskware.Agent
7.1.1

Avira AntiVirus
ADWARE/Adware.Gen
7.11.30.172

AVG
Generic
2015.0.3349

Dr.Web
Adware.DAdmin.151
9.0.1.0259

ESET NOD32
Win32/DownloadAdmin.G potentially unwanted application
8.7.0.302.0

Fortinet FortiGate
Riskware/DownloadAdmin
11/19/2014

F-Secure
Adware:W32/WebInstallBundle
11.2014-16-09_3

K7 AntiVirus
Adware
13.183.13393

Malwarebytes
PUP.Optional.DownloadAdmin
v2014.09.16.11

McAfee
Artemis!5726256FCFA7
5600.6942

Reason Heuristics
PUP.DownloadAdmin.N
14.9.16.21

Sophos
Download Admin
4.98

Trend Micro House Call
Suspicious_GEN.F47V0706
7.2.323

VIPRE Antivirus
Threat.4783369
31208

File size:
916.3 KB (938,336 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Tightrope WebInstall (using Nullsoft Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\chrome-update.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
3/19/2013 7:00:00 PM

Valid to:
5/29/2016 6:59:59 PM

Subject:
CN=Download Admin, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Download Admin, L=SAN FRANCISCO, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
2EEB247A8F9D63D74CE7EF9551E3D401

File PE Metadata
Compilation timestamp:
6/17/2014 10:35:36 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:+xpJMyVWJ0q4kfS6wKhmcRf6vEh7+KAFgtp51idtDWEqOWtVr2/NoPH48:KpanJ0ZkKIh7mFgfidtDWEn20/No

Entry address:
0x3341

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, B0, 73, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, C0, 70, 40, 00, 53, FF, 15, 88, 72, 40, 00, 6A, 08, A3, F8, 24, 7A, 00, E8, 2C, 25, 00, 00, 53, 68, 60, 01, 00, 00, A3, 00, 24, 7A, 00, 8D, 44, 24, 38, 50, 53, 68, 43, 74, 40, 00, FF, 15, 64, 71, 40, 00, 68, 38, 74, 40, 00, 68, 00, 1C, 7A, 00, E8, 1D, 24, 00, 00, FF, 15, BC, 70, 40, 00, 50, BF, 00, 80, 7A, 00, 57, E8, 0B, 24, 00, 00...
 
[+]

Entropy:
7.5077

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

The file chrome-update.exe has been seen being distributed by the following URL.

Remove chrome-update.exe - Powered by Reason Core Security