driver_updater.exe

Plugin Update SL

This is the Softpulse installer which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application driver_updater.exe by Plugin Update SL has been detected as adware by 30 anti-malware scanners. The program is a setup application that uses the Softpulse SoftwareBundler installer. This program installs potentially unwanted software on your PC at the same time as the software you are trying to install, without adequate consent.
Publisher:
Plugin Update SL  (signed and verified)

MD5:
0cb97aa118263ef1a9db8b59de954e29

SHA-1:
99fce031a55c28b1bc1e175855ace61cc4a9684d

SHA-256:
55b603673ff0ca1fc0378f3c12b4acb8b3ff32a265cae50ab55f97a7082c01ca

Scanner detections:
30 / 68

Status:
Adware

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/26/2024 7:08:30 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Bundler.DomaIQ.T
5805142

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
Win-Trojan/Inject.1526984
2014.11.20

Avira AntiVirus
APPL/Softpulse.Gen8
7.11.187.176

avast!
Win32:SoftPulse-AH [PUP]
141119-1

AVG
Found Win32/DH{gRJ UIEHeVRPFVGBFYEJHFOBE0GBDw}
2014.0.4189

Bitdefender
Application.Bundler.DomaIQ.T
1.0.20.1620

Clam AntiVirus
Win.Trojan.Softpulse-40
0.98/19661

Comodo Security
Application.Win32.SoftPulse.GEE
20137

Dr.Web
Trojan.DownLoader11.30734
9.0.1.05190

Emsisoft Anti-Malware
Application.Bundler.DomaIQ.T
14.11.20

ESET NOD32
Win32/SoftPulse.L potentially unwanted application
7.0.302.0

F-Prot
W32/A-715bba29
v6.4.7.1.166

F-Secure
Application.Bundler.DomaIQ
11.2014-20-11_5

G Data
Application.Bundler.DomaIQ
14.11.24

IKARUS anti.virus
not-a-virus:Downloader.Agent
t3scan.1.8.3.0

K7 AntiVirus
Unwanted-Program
13.185.14071

Malwarebytes
PUP.Optional.DomaIQ
v2014.11.20.04

McAfee
Socrydo
5600.6941

MicroWorld eScan
Application.Bundler.DomaIQ.T
15.0.0.972

NANO AntiVirus
Riskware.Win32.SoftPulse.deniau
0.28.6.63474

Norman
Malware
11.20141120

nProtect
Trojan-Clicker/W32.Agent.1526968
14.11.20.01

Panda Antivirus
Trj/Genetic.gen
14.11.20.04

Quick Heal
Trojan.Buzus.A4
11.14.14.00

Reason Heuristics
PUP.PluginUpdateSL.O
14.11.20.3

Sophos
SoftPulse
4.98

Vba32 AntiVirus
Downloader.Agent
3.12.26.3

VIPRE Antivirus
Threat.4150696
34948

Zillya! Antivirus
Adware.Agent.Win32.12175
2.0.0.1988

File size:
1.5 MB (1,526,968 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Softpulse SoftwareBundler

Common path:
C:\users\{user}\downloads\driver_updater.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
6/11/2014 4:00:00 PM

Valid to:
6/12/2015 3:59:59 PM

Subject:
CN=Plugin Update SL, O=Plugin Update SL, L=Guia De Isora, S=Tenerife, C=ES

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
01438AF7C5B708CB0E497C84D028BF72

File PE Metadata
Compilation timestamp:
9/3/2014 11:32:09 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
24576:G5IM/V0deM5lZ2ykPYMkrQ1OrWaRyv2PBcSL+L5/+FMoQl/ugQWiBdrfO+a+x:8IBfvMkrNrf0u3qdaNLgQWiO+R

Entry address:
0x5A07

Entry point:
E8, 41, 2A, 00, 00, E9, 7F, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 8B, 4C, 24, 04, F7, C1, 03, 00, 00, 00, 74, 24, 8A, 01, 83, C1, 01, 84, C0, 74, 4E, F7, C1, 03, 00, 00, 00, 75, EF, 05, 00, 00, 00, 00, 8D, A4, 24, 00, 00, 00, 00, 8D, A4, 24, 00, 00, 00, 00, 8B, 01, BA, FF, FE, FE, 7E, 03, D0, 83, F0, FF, 33, C2, 83, C1, 04, A9, 00, 01, 01, 81, 74, E8, 8B, 41, FC, 84, C0, 74, 32, 84, E4, 74, 24, A9, 00, 00, FF, 00, 74, 13, A9, 00, 00, 00, FF, 74, 02, EB, CD, 8D, 41, FF, 8B...
 
[+]

Code size:
60 KB (61,440 bytes)

The file driver_updater.exe has been seen being distributed by the following URL.

Remove driver_updater.exe - Powered by Reason Core Security