hdplayer_setup(18_4)_apputlockerbanners.exe

CoolMirage Ltd.

This is the setup program for CoolMirage, a potentially unwanted program (PUP) that display ads on the computer. The application hdplayer_setup(18_4)_apputlockerbanners.exe by CoolMirage has been detected as adware by 7 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. The setup installer will bundle multiple adware offers during download and setup (based on the user's geographical location) including toolbars, extensions and coupon utilities.
Publisher:
CoolMirage Ltd.  (signed and verified)

MD5:
b75f186db529da71821c422816fb542f

SHA-1:
a17a0bacabcfbd206102f8bd488968a92b8f9367

SHA-256:
9192c1423d8c9f7195e2620a1af0d6140c7db03c42d3cd3705a0d85ac46d2b95

Scanner detections:
7 / 68

Status:
Adware

Explanation:
Bundles a number of adware programs in the installer.

Analysis date:
4/25/2024 8:34:41 AM UTC  (today)

Scan engine
Detection
Engine version

Dr.Web
Adware.Downware.1263
9.0.1.0100

Malwarebytes
PUP.Optional.OneClickDownloader.A
v2014.04.10.08

McAfee
Artemis!B75F186DB529
5600.7164

Reason Heuristics
PUP.Installer.CoolMirage.h
14.8.7.17

Sophos
CoolMirage
4.91

Trend Micro House Call
TROJ_GEN.F47V0915
7.2.100

VIPRE Antivirus
CoolMirage Ltd
21510

File size:
337.8 KB (345,856 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\downloads\hdplayer_setup(18_4)_apputlockerbanners.exe

Digital Signature
Signed by:

Authority:
Thawte, Inc.

Valid from:
6/6/2013 2:00:00 AM

Valid to:
6/7/2014 1:59:59 AM

Subject:
CN=CoolMirage Ltd., O=CoolMirage Ltd., L=Tel Aviv, S=Israel, C=IL

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
110F603E63C86349A5F243EA06966F33

File PE Metadata
Compilation timestamp:
12/5/2009 11:50:46 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
6144:asH7czejEEkej4GeFMTMPkmlvn2+qb2C7YJR29+xPj3WJqttfnqLGxJ:FKzbOy8mt2+U7029+53WCVqaJ

Entry address:
0x323C

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 30, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B4, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 58, 3F, 42, 00, E8, 09, 2C, 00, 00, A3, A4, 3E, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 58, F4, 41, 00, FF, 15, 58, 71, 40, 00, 68, B8, 91, 40, 00, 68, A0, 36, 42, 00, E8, BC, 28, 00, 00, FF, 15, B0, 70, 40, 00, BF, 00, 90, 42, 00, 50, 57, E8, AA, 28, 00, 00...
 
[+]

Entropy:
7.8666

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The file hdplayer_setup(18_4)_apputlockerbanners.exe has been seen being distributed by the following URL.

Remove hdplayer_setup(18_4)_apputlockerbanners.exe - Powered by Reason Core Security