{blocked}.exe

Max Setup

The installer utilizes the installCore download manager which may bundle additional offers for various ad-supported toolbars, extensions and utilities. The application {blocked}.exe by Max Setup has been detected as adware by 21 anti-malware scanners. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. The file has been seen being downloaded from www.download-provider.org.
Publisher:
Max Setup  (signed and verified)

MD5:
c5882cb976f21e790f95f4924af178ae

SHA-1:
907cf6cfdb97b78d38ca129189a32374133c70a6

SHA-256:
b6cfb4a462d14b175afbe2aae5d66bb74cf5dd8bc2f359960ad1b3719d4fa41c

Scanner detections:
21 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
4/23/2024 11:57:54 PM UTC  (a few moments ago)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Zusy.90992
937

Agnitum Outpost
PUA.InstallCore
7.1.1

Avira AntiVirus
7.11.160.72

AVG
Win.Threat.Medium
2014.0.3986

Bitdefender
Gen:Variant.Zusy.90992
1.0.20.965

Comodo Security
TrojWare.Win32.InstallCore.MJLR
18849

Dr.Web
Trojan.Packed.24524
9.0.1.05190

Emsisoft Anti-Malware
Gen:Variant.Zusy.90992
8.14.07.12.05

ESET NOD32
Win32/InstallCore.ND potentially unwanted application
7.0.302.0

F-Prot
W32/A-ea8e687b
v6.4.7.1.166

F-Secure
Gen:Variant.Zusy.90992
11.2014-12-07_7

G Data
Gen:Variant.Zusy.90992
14.7.24

IKARUS anti.virus
Win32.SuspectCrc
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.180.12701

Malwarebytes
v2014.07.12.05

MicroWorld eScan
Gen:Variant.Zusy.90992
15.0.0.579

Reason Heuristics
PUP.MaxSetup.V
14.7.12.2

Vba32 AntiVirus
3.12.26.3

VIPRE Antivirus
Threat.4786018
31088

Zillya! Antivirus
Trojan.Injected.Win32.4
2.0.0.1856

File size:
626.2 KB (641,192 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\porn flash games pack.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
3/10/2014 5:00:00 PM

Valid to:
3/11/2015 4:59:59 PM

Subject:
CN=Max Setup, O=Max Setup, STREET=Lillienblam 28, L=Tel Aviv, S=Tel Aviv, PostalCode=651307, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
008F6F1294DBB38F9F80A7A06DE489DF45

File PE Metadata
Compilation timestamp:
6/19/1992 3:22:17 PM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:CBopiAlYRJdbDhFTPrkDqzYYcM2qFC2ulymZWuLR1y3kb+1Cr7lcmn:CBo8AlYRNJPrqqt2qFCjl3/yUgIlcmn

Entry address:
0x9C40

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, 86, 94, FF, FF, E8, 8D, A6, FF, FF, E8, 1C, A9, FF, FF, E8, 53, C9, FF, FF, E8, 9A, C9, FF, FF, E8, C9, F2, FF, FF, E8, 30, F4, FF, FF, 33, C0, 55, 68, FC, A2, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, C5, A2, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 96, FE, FF, FF, E8, C9, FA, FF, FF, 8D, 55, F0, 33, C0, E8, 83, CF, FF, FF, 8B, 55, F0, B8, 24, CE, 40, 00, E8, 32, 95, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, 24, CE...
 
[+]

Entropy:
7.8344

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
37 KB (37,888 bytes)

The file {blocked}.exe has been seen being distributed by the following URL.

Remove {blocked}.exe - Powered by Reason Core Security