chromesetup.exe

%VENDOR% Downloader

Dova Network (New Media Holdings Ltd.)

The installer utilizes the installCore download manager which may bundle additional offers for various ad-supported toolbars, extensions and utilities. The application chromesetup.exe, “App Setup ” by Dova Network (New Media Holdings) has been detected as adware by 13 anti-malware scanners. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. The installer is marketed through download protals and search ads as Google's Chrome web browser but will also install additional software offers which include adware, PUPs and browser toolbars.
Publisher:
%VENDOR%  (signed by Dova Network (New Media Holdings Ltd.))

Product:
%VENDOR% Downloader

Description:
App Setup

Version:
1.0.5.a0.1_34879

MD5:
9041933af480726e95484920813b1f03

SHA-1:
45ad2fd75b3a4ccf5f2a1862eb300d02b1c9d0f0

SHA-256:
fd6a4ed53738278ee99d6fb07e1f499d7086ec252c240fe7601e631b41ad41cc

Scanner detections:
13 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
5/12/2024 5:00:39 AM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
ADWARE/InstallCo.zkt
8.3.1.6

AVG
Generic
2017.0.2857

Bkav FE
W32.HfsAdware
1.3.0.6379

Comodo Security
Application.Win32.InstallCore.DQW
22322

Dr.Web
Trojan.InstallCore.33
9.0.1.022

ESET NOD32
Win32/InstallCore.WI potentially unwanted application
10.7.0.302.0

G Data
Win32.Application.InstallCore.CZ
16.1.25

IKARUS anti.virus
AdWare.InstallCo
t3scan.1.9.3.0

K7 AntiVirus
Unwanted-Program
13.204.16124

Malwarebytes
v2016.01.22.07

Reason Heuristics
PUP.NewMedia.Installer.installCore.Installer (M)
16.1.22.7

Sophos
PUA 'Install Core Click run software'
5.15

VIPRE Antivirus
Threat.4786018
40786

File size:
822.6 KB (842,312 bytes)

Product version:
1.0.5.a0.1_34879

Copyright:
%VENDOR%

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\microsoft\windows\inetcache\ie\{random}\chromesetup.exe

Digital Signature
Authority:
GlobalSign nv-sa

Valid from:
10/29/2014 3:13:24 PM

Valid to:
10/30/2015 3:13:24 PM

Subject:
CN=Dova Network (New Media Holdings Ltd.), O=Dova Network (New Media Holdings Ltd.), L=Tel Aviv, C=IL

Issuer:
CN=GlobalSign CodeSigning CA - G2, O=GlobalSign nv-sa, C=BE

Serial number:
1121EA6FC07B9DEE393ABBAEF1AA874D6483

File PE Metadata
Compilation timestamp:
6/19/1992 7:22:17 PM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:8DStGegTc26EWmvv59fwIzP9SumzC4zTQdmI1mLeyBBZ8VH6VfeTSAV0l3:8DStjgY26EW4v5hKLSsakfeTXV0B

Entry address:
0xA5F8

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, CE, 8A, FF, FF, E8, D5, 9C, FF, FF, E8, 64, 9F, FF, FF, E8, 07, A0, FF, FF, E8, A6, BF, FF, FF, E8, 11, E9, FF, FF, E8, 78, EA, FF, FF, 33, C0, 55, 68, C9, AC, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, 92, AC, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 26, F5, FF, FF, E8, 11, F1, FF, FF, 80, 3D, 34, B2, 40, 00, 00, 74, 0C, E8, 23, F6, FF, FF, 33, C0, E8, C4, 97, FF, FF, 8D, 55, F0, 33, C0, E8, B6, C5, FF, FF, 8B, 55...
 
[+]

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
39.5 KB (40,448 bytes)

The file chromesetup.exe has been seen being distributed by the following URL.

Remove chromesetup.exe - Powered by Reason Core Security