delegate_execute.exe

Chromium

SIEN S.A.

This is the SIEN AppScion Installer which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application delegate_execute.exe by SIEN S.A has been detected as a potentially unwanted program by 2 anti-malware scanners. The program is a setup application that uses the SIEN SuperInstall installer.
Publisher:
The Chromium Authors  (signed by SIEN S.A.)

Product:
Chromium

Version:
3.27.0.5541

MD5:
8e6ec2af23939bb4ade26f03267e7eae

SHA-1:
2df792f1dc1c954d39b72c47e4a28bac340b94c8

SHA-256:
67a2e064e87d34fdd49c24548cf9a209e44778ab11e3e3dfd3227499bb529f0d

Scanner detections:
2 / 68

Status:
Potentially unwanted

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/25/2024 6:23:41 PM UTC  (today)

Scan engine
Detection
Engine version

AegisLab AV Signature
Troj.W32.Gen
2.1.4+

Reason Heuristics
PUP.Sien.SIENSA.Bundler (M)
16.2.11.4

File size:
392.8 KB (402,240 bytes)

Product version:
3.27.0.5541

Copyright:
Copyright 2013 The Chromium Authors. All rights reserved.

Original file name:
delegate_execute.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
SIEN SuperInstall

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\beamrise\application\3.27.0.5541\delegate_execute.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
8/21/2012 9:00:00 PM

Valid to:
8/22/2014 8:59:59 PM

Subject:
CN=SIEN S.A., OU=Digital ID Class 3 - Microsoft Software Validation v2, O=SIEN S.A., L=Paris, S=France, C=FR

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
514EA00D30C8C244C3E818890BF73967

File PE Metadata
Compilation timestamp:
7/25/2013 10:28:46 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:7V6sfXiPdmDL/cM6Ro1Tdir3d93t9vwJBHYB:xzkRo1TdQ99FwJS

Entry address:
0x2767D

Entry point:
E8, 56, 6A, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 8B, 45, 08, 8B, D0, 66, 8B, 08, 83, C0, 02, 66, 85, C9, 75, F5, 66, 8B, 4D, 0C, 83, E8, 02, 3B, C2, 74, 05, 66, 39, 08, 75, F4, 66, 39, 08, 74, 02, 33, C0, 5D, C3, 8B, FF, 55, 8B, EC, 83, EC, 14, 56, 8B, 75, 08, 57, 33, FF, 89, 7D, F8, 89, 7D, F4, 89, 7D, FC, 3B, F7, 75, 13, E8, F1, 23, 00, 00, 6A, 16, 5E, 89, 30, E8, 92, F0, FF, FF, 8B, C6, EB, 54, 53, 6A, 24, 68, FF, 00, 00, 00, 56, E8, FE, F7, FF, FF, 8B, 5D, 0C, 83, C4, 0C, 3B, DF, 75, 11, E8...
 
[+]

Code size:
267.5 KB (273,920 bytes)

Remove delegate_execute.exe - Powered by Reason Core Security