roboform-setup.exe

Download Admin

This is the Tightrope WebInstall which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application roboform-setup.exe by Download Admin has been detected as adware by 5 anti-malware scanners. The program is a setup application that uses the Tightrope WebInstall installer. The file has been seen being downloaded from www.winstally.com.
Publisher:
Download Admin  (signed and verified)

MD5:
d9a69e10f3dd47da9447a547fff0c90e

SHA-1:
7d98f021ad6a7018757ab64f6669a8ced1cc16cd

SHA-256:
a320a2f3fe17a59ab8628813bbabde5bd549d85fdabd02d8f64cc5a0770d932f

Scanner detections:
5 / 68

Status:
Adware

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/19/2024 1:52:18 AM UTC  (today)

Scan engine
Detection
Engine version

Dr.Web
Adware.Downware.2220
9.0.1.0122

ESET NOD32
Win32/DownloadAdmin
8.9749

NANO AntiVirus
Riskware.Win32.Downware.crgjbr
0.28.0.59608

Reason Heuristics
PUP.Installer.DownloadAdmin.O
14.8.7.20

VIPRE Antivirus
DownloadAdmin
28784

File size:
611.9 KB (626,536 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Tightrope WebInstall (using Nullsoft Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\roboform-setup.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
3/19/2013 8:00:00 PM

Valid to:
5/29/2016 7:59:59 PM

Subject:
CN=Download Admin, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Download Admin, L=SAN FRANCISCO, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
2EEB247A8F9D63D74CE7EF9551E3D401

File PE Metadata
Compilation timestamp:
6/22/2012 2:07:51 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:96Q778wYSR3FpqJsZ2yHqshvJoHO/7aOXGE+MkBMzW7LomN1gxatKdceJuDF10:9578wnR1isgEtJow7DF+dX7Lj1gA9jhu

Entry address:
0x333B

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, B0, 73, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, C0, 70, 40, 00, 53, FF, 15, 88, 72, 40, 00, 6A, 08, A3, B8, 3C, 42, 00, E8, 2C, 25, 00, 00, 53, 68, 60, 01, 00, 00, A3, C0, 3B, 42, 00, 8D, 44, 24, 38, 50, 53, 68, 43, 74, 40, 00, FF, 15, 64, 71, 40, 00, 68, 38, 74, 40, 00, 68, C0, 33, 42, 00, E8, 1D, 24, 00, 00, FF, 15, BC, 70, 40, 00, 50, BF, 00, 90, 42, 00, 57, E8, 0B, 24, 00, 00...
 
[+]

Entropy:
7.9697

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The file roboform-setup.exe has been seen being distributed by the following URL.

Remove roboform-setup.exe - Powered by Reason Core Security