chromesetup.exe

SuperCool Applications

The installer utilizes the installCore download manager which may bundle additional offers for various ad-supported toolbars, extensions and utilities. The application chromesetup.exe by SuperCool Applications has been detected as adware by 14 anti-malware scanners. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. The installer is marketed through download protals and search ads as Google's Chrome web browser but will also install additional software offers which include adware, PUPs and browser toolbars.
Publisher:
SuperCool Applications  (signed and verified)

MD5:
3fc0ca638e8116681d5f1ec4de61785f

SHA-1:
35bafdf7b0f6973b90ef3d87fa50404ea9084134

SHA-256:
3a69fbcd4448e4fa7d2bffae3be1c61dddb5ac808d7777c28d2fb8117e5f742b

Scanner detections:
14 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This is an installer which may bundle legitimate applications with offers for additional 3rd-party applications that may be unwanted by the user. While the installer contains an 'opt-out' feature this is not set be defult and is usually overlooked.

Analysis date:
4/26/2024 12:00:45 PM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.InstallCore
7.1.1

AhnLab V3 Security
PUP/Win32.InstallCore
2014.09.17

Avira AntiVirus
7.11.172.162

AVG
Max Setup
2015.0.3349

Dr.Web
Trojan.Packed.28474
9.0.1.05190

ESET NOD32
Win32/InstallCore.BY potentially unwanted application
7.0.302.0

F-Prot
W32/A-42c63c6c
v6.4.7.1.166

K7 AntiVirus
Unwanted-Program
13.183.13393

Malwarebytes
v2014.09.16.07

Qihoo 360 Security
Malware.QVM20.Gen
1.0.0.1015

Reason Heuristics
PUP.Installer.SuperCoolApplications.L
14.9.16.16

Rising Antivirus
PE:Malware.XPACK-LNR/Heur!1.5594
23.00.65.14914

VIPRE Antivirus
Threat.4788237
33120

File size:
1.1 MB (1,135,008 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Common path:
C:\users\{user}\downloads\chromesetup.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
8/15/2013 1:00:00 AM

Valid to:
8/16/2014 12:59:59 AM

Subject:
CN=SuperCool Applications, O=SuperCool Applications, STREET=63 Ronthscheld Blvd., L=Tel Aviv, S=Israel, PostalCode=65785, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
7239B70290995A99967AE1DE581942C0

File PE Metadata
Compilation timestamp:
6/19/1992 11:22:17 PM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
24576:wPMJfsYX7SY0tt1LyxRq/pZ6GWr5kd04kZVuNVVVUAw6abiQHh:BJfskeLtt1JZ6Gs5G7b0AwZpH

Entry address:
0x98CC

Entry point:
55, 8B, EC, 83, C4, CC, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, FA, 97, FF, FF, E8, 01, AA, FF, FF, E8, 2C, CC, FF, FF, E8, 73, CC, FF, FF, E8, 0A, F3, FF, FF, E8, 71, F4, FF, FF, 33, C0, 55, 68, 76, 9F, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, 2C, 9F, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, B0, 40, 00, E8, 9B, FE, FF, FF, E8, 26, FA, FF, FF, 8D, 55, F0, 33, C0, E8, E0, D0, FF, FF, 8B, 55, F0, B8, D8, BD, 40, 00, E8, AB, 98, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, D8, BD, 40, 00, B2, 01, B8...
 
[+]

Entropy:
7.8578

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
36 KB (36,864 bytes)

The file chromesetup.exe has been seen being distributed by the following URL.

Remove chromesetup.exe - Powered by Reason Core Security