setup.exe

Download Admin

This is the Tightrope WebInstall which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application setup.exe by Download Admin has been detected as adware by 13 anti-malware scanners. The program is a setup application that uses the Tightrope WebInstall installer.
Publisher:
Download Admin  (signed and verified)

MD5:
956abf8c7d8a399b3881a59c50647313

SHA-1:
e9a74e3db7e1b1a844bb4e9483b2963b3663b876

SHA-256:
23012060110a6d73458b2438bbc39c64a92b34eb5f51e942712cc8242d7900f3

Scanner detections:
13 / 68

Status:
Adware

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/24/2024 11:22:59 PM UTC  (a few moments ago)

Scan engine
Detection
Engine version

Agnitum Outpost
Riskware.Agent
7.1.1

Avira AntiVirus
ADWARE/Adware.Gen
7.11.30.172

AVG
Generic
2015.0.3314

Dr.Web
Adware.DAdmin.151
9.0.1.0295

ESET NOD32
Win32/DownloadAdmin.G potentially unwanted application
8.7.0.302.0

Fortinet FortiGate
Riskware/DownloadAdmin
10/22/2014

F-Secure
Adware:W32/WebInstallBundle
11.2014-22-10_4

Malwarebytes
PUP.Optional.DownloadAdmin
v2014.10.22.07

McAfee
Artemis!5726256FCFA7
5600.6970

Reason Heuristics
PUP.Installer.DownloadAdmin.F
14.10.22.7

Sophos
Download Admin
4.98

Trend Micro House Call
Suspicious_GEN.F47V0706
7.2.295

VIPRE Antivirus
Threat.4783369
31208

File size:
75.9 MB (79,581,568 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Tightrope WebInstall (using Nullsoft Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\setup.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
3/20/2013 12:00:00 AM

Valid to:
5/30/2016 12:59:59 AM

Subject:
CN=Download Admin, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Download Admin, L=SAN FRANCISCO, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
2EEB247A8F9D63D74CE7EF9551E3D401

File PE Metadata
Compilation timestamp:
6/17/2014 4:35:36 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:ixpJMyVWJ0q4kfS6wKhmcRf6vEh7+KAFgtp51idtDWEqOWtVr2/NoPH48:OpanJ0ZkKIh7mFgfidtDWEn20/No

Entry address:
0x3341

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, B0, 73, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, C0, 70, 40, 00, 53, FF, 15, 88, 72, 40, 00, 6A, 08, A3, F8, 24, 7A, 00, E8, 2C, 25, 00, 00, 53, 68, 60, 01, 00, 00, A3, 00, 24, 7A, 00, 8D, 44, 24, 38, 50, 53, 68, 43, 74, 40, 00, FF, 15, 64, 71, 40, 00, 68, 38, 74, 40, 00, 68, 00, 1C, 7A, 00, E8, 1D, 24, 00, 00, FF, 15, BC, 70, 40, 00, 50, BF, 00, 80, 7A, 00, 57, E8, 0B, 24, 00, 00...
 
[+]

Entropy:
0.1654

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

Remove setup.exe - Powered by Reason Core Security