hdplayer_setup(18_4)_apputlockerbanners.exe

CoolMirage Ltd.

This is the setup program for CoolMirage, a potentially unwanted program (PUP) that display ads on the computer. The application hdplayer_setup(18_4)_apputlockerbanners.exe by CoolMirage has been detected as adware by 5 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. The setup installer will bundle multiple adware offers during download and setup (based on the user's geographical location) including toolbars, extensions and coupon utilities.
Publisher:
CoolMirage Ltd.  (signed and verified)

MD5:
da2df7467bbd4ca644792cd89d35b5ef

SHA-1:
179bd8f35364b35b7904b20f8026e59ced36d091

SHA-256:
8e0c150ddbef92b702585dee05b79b1d54d96f838bff6f268b440d67d5db63aa

Scanner detections:
5 / 68

Status:
Adware

Explanation:
Bundles a number of adware programs in the installer.

Analysis date:
4/19/2024 2:49:18 AM UTC  (today)

Scan engine
Detection
Engine version

Dr.Web
Adware.Downware.1263
9.0.1.0253

Malwarebytes
PUP.Optional.OneClickDownloader.A
v2014.09.10.11

Reason Heuristics
PUP.Installer.CoolMirage.h
14.9.10.11

Sophos
CoolMirage
4.91

VIPRE Antivirus
News.net
21636

File size:
337.9 KB (346,000 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\downloads\hdplayer_setup(18_4)_apputlockerbanners.exe

Digital Signature
Signed by:

Authority:
Thawte, Inc.

Valid from:
6/5/2013 7:00:00 PM

Valid to:
6/6/2014 6:59:59 PM

Subject:
CN=CoolMirage Ltd., O=CoolMirage Ltd., L=Tel Aviv, S=Israel, C=IL

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
110F603E63C86349A5F243EA06966F33

File PE Metadata
Compilation timestamp:
12/5/2009 4:50:46 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
6144:csH7cmFdWPbMsDNeabcIv5b6yM9jBU2CozgZJ5SaWik0Rnj0KraMSz:fjCxNeabcIhb6H9VUpMZaxNraF

Entry address:
0x323C

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 30, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B4, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 58, 3F, 42, 00, E8, 09, 2C, 00, 00, A3, A4, 3E, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 58, F4, 41, 00, FF, 15, 58, 71, 40, 00, 68, B8, 91, 40, 00, 68, A0, 36, 42, 00, E8, BC, 28, 00, 00, FF, 15, B0, 70, 40, 00, BF, 00, 90, 42, 00, 50, 57, E8, AA, 28, 00, 00...
 
[+]

Entropy:
7.8675

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The file hdplayer_setup(18_4)_apputlockerbanners.exe has been seen being distributed by the following URL.

Remove hdplayer_setup(18_4)_apputlockerbanners.exe - Powered by Reason Core Security