googlechromesetup.exe

Web

Top Balance (New Media Holdings Ltd.)

The installer utilizes the installCore download manager which may bundle additional offers for various ad-supported toolbars, extensions and utilities. The application googlechromesetup.exe, “Web Setup ” by Top Balance (New Media Holdings) has been detected as adware by 12 anti-malware scanners. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. With this installer, users are expecting to download Google's Chrome web browser but before that occurs they may be presented with additional offers, mostly potentially unwanted software or adware.
Publisher:
Installer   (signed by Top Balance (New Media Holdings Ltd.))

Product:
Web

Description:
Web Setup

Version:
4.7.3.0

MD5:
a2f678fa374b0c1fef0ed42c6cd94989

SHA-1:
cf4b593975314e5d4579d49c266f57ffd794bf8b

SHA-256:
0e9e3ae687aa55d0eec52b75ac0138314967ce3f878fcb71f84e6f00bdfa2605

Scanner detections:
12 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
11/10/2025 7:51:38 PM UTC  (today)

Scan engine
Detection
Engine version

AVG
Generic
2017.0.2850

Bkav FE
W32.HfsAdware
1.3.0.6379

Dr.Web
Trojan.InstallCore.152
9.0.1.028

ESET NOD32
Win32/InstallCore.ZM potentially unwanted application
10.7.0.302.0

F-Secure
Gen:Variant.Adware.Kazy
11.2016-28-01_5

G Data
Win32.Application.InstallCore.EG
16.1.25

K7 AntiVirus
Adware
13.205.16229

Malwarebytes
v2016.01.28.09

Panda Antivirus
PUP/Multitoolbar
16.01.28.09

Reason Heuristics
PUP.NewMedia.Installer.installCore.Installer (M)
16.1.28.21

Vba32 AntiVirus
Malware-Cryptor.InstallCore.gen
3.12.26.4

VIPRE Antivirus
Threat.4786018
40828

File size:
688.1 KB (704,616 bytes)

Product version:
1.2

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\microsoft\windows\inetcache\ie\{random}\googlechromesetup.exe

Digital Signature
Authority:
GlobalSign nv-sa

Valid from:
2/11/2015 5:54:46 PM

Valid to:
2/12/2016 5:54:46 PM

Subject:
CN=Top Balance (New Media Holdings Ltd.), O=Top Balance (New Media Holdings Ltd.), L=Tel Aviv, C=IL

Issuer:
CN=GlobalSign CodeSigning CA - G2, O=GlobalSign nv-sa, C=BE

Serial number:
112195E753935A102CF246567B961877F414

File PE Metadata
Compilation timestamp:
6/20/1992 12:22:17 AM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:Quop1JINd1RPY9aevK4iOfbmQ1dm9HM2DkhKRONhUaNWTQvASfPXXEgtZr5oXQRZ:QuoXJIn1R4aKK4FfCsphL6alPfPXXE41

Entry address:
0x9C40

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, 86, 94, FF, FF, E8, 8D, A6, FF, FF, E8, 1C, A9, FF, FF, E8, 53, C9, FF, FF, E8, 9A, C9, FF, FF, E8, C9, F2, FF, FF, E8, 30, F4, FF, FF, 33, C0, 55, 68, FC, A2, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, C5, A2, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 96, FE, FF, FF, E8, C9, FA, FF, FF, 8D, 55, F0, 33, C0, E8, 83, CF, FF, FF, 8B, 55, F0, B8, 24, CE, 40, 00, E8, 32, 95, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, 24, CE...
 
[+]

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
37 KB (37,888 bytes)

The file googlechromesetup.exe has been seen being distributed by the following URL.

Remove googlechromesetup.exe - Powered by Reason Core Security