flashplayer14_install_win_pi.exe

Adobe Flash Player

Innovative Systems LLC

The application flashplayer14_install_win_pi.exe by Innovative Systems has been detected as adware by 22 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. The installer uses the OpenCandy monitzation platform which will donwload and install offers in the setup for potentially unwanted software including ad/search-supported toolbars. It is also typically executed from an Internet Explorer cache folder.
Publisher:
Innovative Systems LLC  (signed and verified)

Product:
Adobe Flash Player

Version:
1.0.0.0

MD5:
9d469f851f539eb8223b6b38e5249050

SHA-1:
fc135c8ed4118dd44257835287bca06d338b636b

SHA-256:
058fe8e1797f2e1244b31c2a7d8b26f867f1ec337f1a90e8bb856ffb451adc67

Scanner detections:
22 / 68

Status:
Adware

Explanation:
Packages the OpenCandy software bundler that offers to install additional software and may include web browser add-ons and toolbars which display advertising (based on publisher settings and geo context).

Analysis date:
5/7/2024 8:46:43 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
PUP/Win32.Agent
2014.10.25

Avira AntiVirus
APPL/Downloader.Gen
7.11.180.252

avast!
Win32:Adware-gen [Adw]
2014.9-160215

AVG
AdLoad.OpenCandy
2017.0.2833

Baidu Antivirus
Adware.Win32.JoyDownloader
4.0.3.16215

Clam AntiVirus
Win.Trojan.Opencandy
0.98/21411

Comodo Security
Application.Win32.OpenCandy.~B
19259

Dr.Web
Adware.Downware.5295
9.0.1.046

ESET NOD32
Win32/JoyDownloader
10.10615

G Data
Win32.Adware.OpenCandy
16.2.24

IKARUS anti.virus
PUA.JoyDownloader
t3scan.1.7.5.0

K7 AntiVirus
Unwanted-Program
13.185.13789

Malwarebytes
PUP.Optional.OpenCandy
v2016.02.15.03

McAfee
Artemis!1FC34F821322
5600.6489

NANO AntiVirus
Riskware.Win32.Downware.dejknq
0.28.2.62841

Qihoo 360 Security
HEUR/Malware.QVM06.Gen
1.0.0.1015

Reason Heuristics
PUP.InnovativeSystems.Installer (M)
16.2.15.3

Sophos
Generic PUA IK
4.98

Trend Micro House Call
ADW_JOYLOAD
7.2.46

Trend Micro
ADW_JOYLOAD
10.465.15

VIPRE Antivirus
Trojan.Win32.Generic
34208

File size:
513 KB (525,336 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\microsoft\windows\temporary internet files\content.ie5\{random}\flashplayer14_install_win_pi.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
5/19/2014 2:00:00 AM

Valid to:
5/20/2015 1:59:59 AM

Subject:
CN=Innovative Systems LLC, O=Innovative Systems LLC, L=Dnepropetrovsk, S=Dnepropetrovska oblast, C=UA

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
450EACFE8D673E82864CE46BC1A92FCA

File PE Metadata
Compilation timestamp:
5/20/2013 1:53:11 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:dKc2anWD/RfTx9djxWtfjs6SEX41ulHcG1ibPFouHOQ2:z2iWDRhxWR9SEX41gHcSibPuJQ2

Entry address:
0x333E

Entry point:
81, EC, D4, 02, 00, 00, 53, 55, 56, 57, 6A, 20, 33, ED, 5E, 89, 6C, 24, 18, C7, 44, 24, 10, 30, A2, 40, 00, 89, 6C, 24, 14, FF, 15, 34, 80, 40, 00, 68, 01, 80, 00, 00, FF, 15, BC, 80, 40, 00, 55, FF, 15, AC, 82, 40, 00, 6A, 08, A3, 78, 4F, 43, 00, E8, A8, 2E, 00, 00, A3, C4, 4E, 43, 00, 55, 8D, 44, 24, 34, 68, B4, 02, 00, 00, 50, 55, 68, F0, B1, 42, 00, FF, 15, 7C, 81, 40, 00, 68, 7C, A3, 40, 00, 68, C0, 3E, 43, 00, E8, 13, 2B, 00, 00, FF, 15, 34, 81, 40, 00, BB, 00, F0, 43, 00, 50, 53, E8, 01, 2B, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
24.5 KB (25,088 bytes)

Remove flashplayer14_install_win_pi.exe - Powered by Reason Core Security