ext_setup.exe

Andrew Kruzov

The is the installer for the WebPick InstalleRex download manager which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed without consent. The application ext_setup.exe by Andrew Kruzov has been detected as adware by 30 anti-malware scanners. The program is a setup application that uses the WebPick InstalleRex installer. It is built using the Crossrider cross-browser extension toolkit. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider.
Publisher:
Andrew Kruzov  (signed and verified)

MD5:
d258f3fc2e71276faa3a248cb0652ff9

SHA-1:
af39315e4e877e08ddc15ee8d9c6797a25f00d73

SHA-256:
7a21bdc4e79c24d709915e689cc51ab69af81ef17fffe21edbc6473b6bcf66b4

Scanner detections:
30 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
5/8/2024 7:38:50 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Dropper.101
822

Agnitum Outpost
PUA.MultiPlug
7.1.1

AhnLab V3 Security
Adware/Win32.Agent
2014.11.05

Avira AntiVirus
TR/Graftor.141601.A
7.11.183.24

avast!
Win32:MultiPlug-AQ [PUP]
141025-0

AVG
Adware Generic_r.JY
2014.0.4189

Bitdefender
Gen:Variant.Adware.Dropper.101
1.0.20.1540

Clam AntiVirus
Win.Adware.Multiplug-16
0.98/19586

Comodo Security
Application.Win32.Multiplug.GETF
19994

Dr.Web
Trojan.Crossrider.12912
9.0.1.05190

Emsisoft Anti-Malware
Gen:Variant.Adware.Dropper.101
14.11.04

ESET NOD32
probably Win32/AdWare.MultiPlug.R application
7.0.302.0

Fortinet FortiGate
Riskware/Generic.AC.1814531
11/4/2014

F-Prot
W32/MultiPlug.C.gen
v6.4.7.1.166

F-Secure
Gen:Variant.Adware.Dropper.101
11.2014-04-11_3

G Data
Gen:Variant.Adware.Dropper.101
14.11.24

IKARUS anti.virus
AdWare.Win32.Dropper
t3scan.1.8.3.0

K7 AntiVirus
Adware
13.185.13888

Kaspersky
not-a-virus:AdWare.JS.MultiPlug
15.0.0.494

Malwarebytes
PUP.Optional.MultiPlug
v2014.11.04.05

McAfee
PUP-FID
5600.6956

MicroWorld eScan
Gen:Variant.Adware.Dropper.101
15.0.0.924

NANO AntiVirus
Riskware.Win32.Crossrider.cwprty
0.28.6.62995

Quick Heal
Adware.VBS.Megasearch.Gen
11.14.14.00

Reason Heuristics
PUP.Installer.AndrewKruzov.J
14.11.4.16

Rising Antivirus
PE:Malware.MultiPlug!6.13CF
23.00.65.141102

Sophos
MultiPlug
4.98

Vba32 AntiVirus
AdWare.JS.MultiPlug
3.12.26.3

VIPRE Antivirus
Threat.4150696
34232

Zillya! Antivirus
Adware.MultiPlug.Win32.11
2.0.0.1975

File size:
689.8 KB (706,352 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
WebPick InstalleRex

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\addons\ext_setup.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
9/27/2013 1:00:00 AM

Valid to:
9/28/2014 12:59:59 AM

Subject:
CN=Andrew Kruzov, O=Andrew Kruzov, STREET=Savrasova 31, L=Kiev, S=Kiev, PostalCode=03110, C=UA

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
53C0E7306A4ED340CBA044D801891A67

File PE Metadata
Compilation timestamp:
4/16/2014 10:36:39 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
12288:H8mExUjIg1ZrtX5a5GOTb2/9gY43uCM2+Ixf/zFdPQVyVz4xX6iHWZUo4:HrEmZrtTwb1+CM2bf/7z4xX6gW6D

Entry address:
0x1089B

Entry point:
E8, 3E, 4A, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 80, 21, 42, 00, E8, 1F, 21, 00, 00, E8, E0, 07, 00, 00, 0F, B7, F0, 6A, 02, E8, D1, 49, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, 90, 37, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Code size:
102.5 KB (104,960 bytes)

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to r1.stylezip.info  (54.186.255.26:80)

Remove ext_setup.exe - Powered by Reason Core Security