chromesetup.exe

SuperCool Applications

The installer utilizes the installCore download manager which may bundle additional offers for various ad-supported toolbars, extensions and utilities. The application chromesetup.exe by SuperCool Applications has been detected as adware by 17 anti-malware scanners. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. The installer is marketed through download protals and search ads as Google's Chrome web browser but will also install additional software offers which include adware, PUPs and browser toolbars.
Publisher:
SuperCool Applications  (signed and verified)

MD5:
d664d77f763fd26f558106797d0ae176

SHA-1:
d758420d4e078fc93418a6f2b610e5e4a4754841

SHA-256:
727b88ce088a119099c3809a2736a5cd7a3584a1eaae8cd428386da3a44784d5

Scanner detections:
17 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
4/24/2024 5:32:18 PM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
7.11.137.234

AVG
Adware InstallCore.LA
2014.0.4253

Baidu Antivirus
Adware.Win32.InstallCore
4.0.3.15127

Dr.Web
Trojan.Packed.24524
9.0.1.05190

ESET NOD32
Win32/InstallCore.IK potentially unwanted application
7.0.302.0

Fortinet FortiGate
Riskware/InstallCore
1/27/2015

F-Prot
W32/InstallCore.AC.gen
v6.4.7.1.166

K7 AntiVirus
Unwanted-Program
13.183.13333

Malwarebytes
PUP.Optional.SuperCoolApps.A
v2015.01.27.02

Qihoo 360 Security
Win32/Virus.Adware.94c
1.0.0.1015

Reason Heuristics
PUP.Installer.ironSource
15.1.27.14

Sophos
PUA 'Install Core Click run software'
5.10

SUPERAntiSpyware
10090

Trend Micro House Call
TROJ_GEN.F47V0123
7.2.27

Vba32 AntiVirus
3.12.24.3

VIPRE Antivirus
InstallCore.b
27528

Zillya! Antivirus
Adware.Agent.Win32.8971
2.0.0.1773

File size:
1.1 MB (1,113,168 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\chromesetup.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
8/14/2013 7:00:00 PM

Valid to:
8/15/2014 6:59:59 PM

Subject:
CN=SuperCool Applications, O=SuperCool Applications, STREET=63 Ronthscheld Blvd., L=Tel Aviv, S=Israel, PostalCode=65785, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
7239B70290995A99967AE1DE581942C0

File PE Metadata
Compilation timestamp:
6/19/1992 5:22:17 PM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
24576:ZvSfrBE+Cs5jBT6d+JQI7323w3/xGJs2f7BlMMie10iqs1yeT4:t41Fx9tS3w3/IPfllM410HN

Entry address:
0x9C40

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, 86, 94, FF, FF, E8, 8D, A6, FF, FF, E8, 1C, A9, FF, FF, E8, 53, C9, FF, FF, E8, 9A, C9, FF, FF, E8, C9, F2, FF, FF, E8, 30, F4, FF, FF, 33, C0, 55, 68, FC, A2, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, C5, A2, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 96, FE, FF, FF, E8, C9, FA, FF, FF, 8D, 55, F0, 33, C0, E8, 83, CF, FF, FF, 8B, 55, F0, B8, 24, CE, 40, 00, E8, 32, 95, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, 24, CE...
 
[+]

Entropy:
7.8398

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
37 KB (37,888 bytes)

The file chromesetup.exe has been seen being distributed by the following URL.

Remove chromesetup.exe - Powered by Reason Core Security