flashplayer.exe

Max Setup

The installer utilizes the installCore download manager which may bundle additional offers for various ad-supported toolbars, extensions and utilities. The application flashplayer.exe by Max Setup has been detected as adware by 22 anti-malware scanners. The program is a setup application that uses the installCore installer. According to AVG, this software downloads additional adware offers during setup.
Publisher:
Max Setup  (signed and verified)

MD5:
ae392e26210c0fb6a70746bfc9151362

SHA-1:
5c27375ed3c77e7804aa89d9f350ffe75d16c997

SHA-256:
a9c2d1fe8a338d57a07a2c35a853d3bf8df1a58bd053ba34f2ee275afca78998

Scanner detections:
22 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/18/2024 2:02:45 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Trojan.Heur2.GZ.PGZ@bOvG9sai
864

Agnitum Outpost
Backdoor.Hupigon
7.1.1

Avira AntiVirus
7.11.157.134

AVG
Potentially harmful program Skodna.Downloader
2015.0.3342

Bitdefender
Gen:Trojan.Heur2.GZ.PGZ@bOvG9sai
1.0.20.1330

Clam AntiVirus
Win.Trojan.Heur2-150
0.98/19422

Comodo Security
Application.Win32.Installcore.MX
18701

Dr.Web
Trojan.Packed.24524
9.0.1.0266

Emsisoft Anti-Malware
Gen:Trojan.Heur2.GZ.PGZ@bOvG9sai
8.14.09.23.03

ESET NOD32
Win32/InstallCore.BY potentially unwanted application
8.7.0.302.0

F-Prot
W32/A-dbe1ec51
v6.4.7.1.166

F-Secure
Gen:Trojan.Heur2.GZ.PGZ@bOvG9sai
11.2014-23-09_3

G Data
Gen:Trojan.Heur2.GZ.PGZ@bOvG9sai
14.9.24

IKARUS anti.virus
Trojan.Win32.Spy2
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.180.12553

MicroWorld eScan
Gen:Trojan.Heur2.GZ.PGZ@bOvG9sai
15.0.0.798

NANO AntiVirus
Riskware.Win32.InstallCore.dcnbhm
0.28.2.62286

Reason Heuristics
PUP.MaxSetup.L
14.9.23.14

Vba32 AntiVirus
3.12.26.3

VIPRE Antivirus
Threat.4150696
29708

File size:
663.8 KB (679,760 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Common path:
C:\users\{user}\downloads\flashplayer.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
3/11/2014 9:00:00 AM

Valid to:
3/12/2015 8:59:59 AM

Subject:
CN=Max Setup, O=Max Setup, STREET=Lillienblam 28, L=Tel Aviv, S=Tel Aviv, PostalCode=651307, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
008F6F1294DBB38F9F80A7A06DE489DF45

File PE Metadata
Compilation timestamp:
6/20/1992 7:22:17 AM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:qnvpebEFCgHco3xqixdQuH7puHK4djfc1d8/ANRuDpwLBHaNqmdrp1p3JRw7IzHb:qnvkEFCg8ojHlJufid840pbqEN3kOH

Entry address:
0x9C40

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, 86, 94, FF, FF, E8, 8D, A6, FF, FF, E8, 1C, A9, FF, FF, E8, 53, C9, FF, FF, E8, 9A, C9, FF, FF, E8, C9, F2, FF, FF, E8, 30, F4, FF, FF, 33, C0, 55, 68, FC, A2, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, C5, A2, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 96, FE, FF, FF, E8, C9, FA, FF, FF, 8D, 55, F0, 33, C0, E8, 83, CF, FF, FF, 8B, 55, F0, B8, 24, CE, 40, 00, E8, 32, 95, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, 24, CE...
 
[+]

Entropy:
7.8577

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
37 KB (37,888 bytes)

Remove flashplayer.exe - Powered by Reason Core Security