microsoftword2010.exe

Microsoft Word 2010

Download Manager

This is part of the Air Installer, a download manager which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application microsoftword2010.exe, “Microsoft Word 2010 ” by Download Manager has been detected as adware by 22 anti-malware scanners. The program is a setup application that uses the AirInstaller Download Manager installer. The file has been seen being downloaded from files.downloadd.org.
Publisher:
Download Manager   (signed by Download Manager)

Product:
Microsoft Word 2010

Description:
Microsoft Word 2010

Version:
2.0.5.0

MD5:
6ba0f9c56c87cfe513039eee92140935

SHA-1:
ac8b5ceba373784c03193146ca9cfe29f37602cf

SHA-256:
25af65728884bea20368430e17f7feab1c9ad55b28a89be8194cd289df03add0

Scanner detections:
22 / 68

Status:
Adware

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
4/18/2024 5:05:58 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.AirAd
7.1.1

Avira AntiVirus
ADWARE/Adware.Gen
7.11.209.90

AVG
Adware Generic_r.JF
2014.0.4257

Clam AntiVirus
Win.Adware.Airadinstaller-21
0.98/20051

Comodo Security
Application.Win32.AirAdInstaller.B
21032

Dr.Web
Trojan.SMSSend.4819
9.0.1.05190

ESET NOD32
Win32/AirAdInstaller.A potentially unwanted application
7.0.302.0

Fortinet FortiGate
Riskware/Generic.AC.1804243
2/10/2015

F-Prot
W32/A-8c0ea402
v6.4.7.1.166

G Data
Win32.Adware.Airadinstaller
15.2.25

IKARUS anti.virus
PUA.AirAdInstaller
t3scan.1.8.6.0

K7 AntiVirus
Unwanted-Program
13.194.14927

Kaspersky
not-a-virus:AdWare.Win32.AirAdInstaller
15.0.0.543

Malwarebytes
PUP.Optional.AirAdInstaller
v2015.02.10.04

NANO AntiVirus
Riskware.Win32.AirAdInstaller.cwanhi
0.30.0.65070

Quick Heal
Adware.AirAdInstaller.I5
2.15.14.00

Reason Heuristics
PUP.Installer.Air Software
15.2.10.16

Rising Antivirus
PE:PUF.Airinstall!1.9C4C
23.00.65.15208

Sophos
PUA 'AirInstaller'
5.09

Vba32 AntiVirus
AdWare.AirAdInstaller.ajov
3.12.26.3

VIPRE Antivirus
Threat.4150696
36694

Zillya! Antivirus
Adware.AirAdInstaller.Win32.150
2.0.0.2061

File size:
842.4 KB (862,648 bytes)

Product version:
2.0.5.0

Copyright:
(c) Download Manager

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
AirInstaller Download Manager

Language:
English (United States)

Common path:
C:\users\{user}\downloads\microsoftword2010.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
6/7/2013 8:00:00 PM

Valid to:
6/8/2014 7:59:59 PM

Subject:
CN=Download Manager, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Download Manager, L=Vancouver, S=British Columbia, C=CA

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
428E8B7C1AC548D083F4D3A0C5FDAF4C

File PE Metadata
Compilation timestamp:
3/6/2014 2:15:18 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:87OkPVpSfAMEbmW3t9oPt2QWfIwV4j8eBhtuKG+YWpafR70fvg92iYttMhmNdvVp:82AP9a2DIHg+tNG/WpaJ7uvBibqdv/Km

Entry address:
0x269510

Entry point:
60, BE, 00, 60, 5A, 00, 8D, BE, 00, B0, E5, FF, 57, 83, CD, FF, EB, 10, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 75, D1, F8, 89...
 
[+]

Entropy:
7.8869

Packer / compiler:
UPX 2.90LZMA

Code size:
784 KB (802,816 bytes)

The file microsoftword2010.exe has been seen being distributed by the following URL.

Remove microsoftword2010.exe - Powered by Reason Core Security