cheat engine setup.exe

Zulu Soft SRL

This the Soft32 ad-supported download manager that bundles additional PUP offers. "During the download process we may show commercial offers, such as a toolbar or other browser add-ons. The download manager is in no way affiliated or endorsed by the author of this product." The application cheat engine setup.exe by Zulu Soft SRL has been detected as adware by 12 anti-malware scanners. The program is a setup application that uses the Soft32 Download Manager installer. The file has been seen being downloaded from cheat-engine.soft32.com.
Publisher:
Zulu Soft SRL  (signed and verified)

MD5:
e0c67b941d86c89e31e725f079f21fff

SHA-1:
d7c18a1bd9bdac74e76d20d026a0a630874c9f52

SHA-256:
ffa4ad4c6573bc0a864b542d4d0c3a2470d5d4080fa931fb81ae0f014d21bfc1

Scanner detections:
12 / 68

Status:
Adware

Explanation:
The setup file is part of the Soft32.com download and install manager. It is an ad-supported installer and attempts to get the user to install various adware toolbars, browser add-ons, game applications or other potentially unwanted programs. If a sponsored software offer such as a toolbar is installed it might change the User’s home page, default search settings and 404 traffic. Note, the software installed by Soft32 is probably safe, just the installer is unwanted.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/23/2024 11:54:27 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.Soft32Downloader
7.1.1

Avira AntiVirus
APPL/Downloader.Gen
7.11.167.118

Dr.Web
Adware.Downware.2152
9.0.1.0226

ESET NOD32
MSIL/Soft32Downloader.C potentially unwanted application
8.7.0.302.0

herdProtect (fuzzy)
2014.10.30.15

Malwarebytes
PUP.Optional.Soft32.A
v2014.08.15.08

McAfee
SoftDropper
5600.7038

NANO AntiVirus
Riskware.Nsis.Downloader.cvxhzw
0.28.0.60475

Reason Heuristics
PUP.Installer.ZuluSoftSRL.S
14.8.14.15

Trend Micro House Call
ADW_DOWNWARE.GC
7.2.227

Trend Micro
ADW_DOWNWARE.GC
10.465.15

VIPRE Antivirus
Threat.4783370
29708

File size:
545.8 KB (558,912 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Soft32 Download Manager (using Nullsoft Install System)

Common path:
C:\users\{user}\downloads\cheat engine setup.exe

Digital Signature
Signed by:

Authority:
Symantec Corporation

Valid from:
6/4/2013 1:00:00 AM

Valid to:
6/18/2016 12:59:59 AM

Subject:
CN=Zulu Soft SRL, O=Zulu Soft SRL, L=Sibiu, S=Sibiu, C=RO, SERIALNUMBER=J32/987/2007, OID.2.5.4.15=Private Organization, OID.1.3.6.1.4.1.311.60.2.1.3=RO

Issuer:
CN=Symantec Class 3 Extended Validation Code Signing CA, OU=Symantec Trust Network, O=Symantec Corporation, C=US

Serial number:
22D4D7E5042BE9C2999CB05C4CA2BB4F

File PE Metadata
Compilation timestamp:
12/5/2009 10:50:52 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:bAXGxwcvzFhb4Dw6YY2+IMHNCzc3u3iOkTdXzhremBX:EYw8zFhbCwozHNh3uizXxem

Entry address:
0x30FA

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 18, EC, 42, 00, E8, F1, 2B, 00, 00, A3, 64, EB, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 98, 8F, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 60, E3, 42, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 40, 43, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Entropy:
7.9229

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

The file cheat engine setup.exe has been seen being distributed by the following URL.

Remove cheat engine setup.exe - Powered by Reason Core Security