setup.exe

Pour Over Digital

This is the Tightrope WebInstall which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application setup.exe by Pour Over Digital has been detected as adware by 11 anti-malware scanners. The program is a setup application that uses the Tightrope WebInstall installer. It is also typically executed from the user's temporary directory.
Publisher:
Pour Over Digital  (signed and verified)

MD5:
7cce7e4e1f85a021751ea37b09c0735f

SHA-1:
4604a4ca9acb0b5339fce4dcfdf4d563d0dd9be3

SHA-256:
d80d91319e4a3a9a66074433eabd1d5733754698569235af73ce03dd24d4030d

Scanner detections:
11 / 68

Status:
Adware

Explanation:
Bundles additional software, mostly toolbars and other potentially unwanted applications using the Vittalia monitization installer.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/26/2024 3:02:36 PM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
PUP/Win32.DownloadAdmin
2015.06.02

Avira AntiVirus
TR/Graftor.668808
8.3.1.6

avast!
Win32:DownloadAdmin-P [PUP]
150525-2

AVG
Generic
2016.0.3091

Bkav FE
W32.HfsAdware
1.3.0.6379

Dr.Web
Trojan.Vittalia.65
9.0.1.05190

F-Prot
W32/S-c88db2b4
v6.4.7.1.166

K7 AntiVirus
Unwanted-Program
13.204.16108

Malwarebytes
PUP.Optional.DownloadAdmin.C
v2015.06.02.09

Reason Heuristics
PUP.Tightrope.Bundler
15.6.2.9

VIPRE Antivirus
Threat.4783369
40552

File size:
653.1 KB (668,800 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Tightrope WebInstall (using Nullsoft Install System)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\setup.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
10/31/2014 12:00:00 AM

Valid to:
10/31/2015 11:59:59 PM

Subject:
CN=Pour Over Digital, O=Pour Over Digital, L=SAN FRANCISCO, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
1A73CF95C7D17B433DC88946E1784EFB

File PE Metadata
Compilation timestamp:
5/11/2015 7:14:16 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
12288:V9cazLCHa4Aq9C5pdDHG850PBkHh6wrZkbY9380QpkY6sj8eCaRV4gSQTOBL:Tcaz+Hafq9CFDH3OmB6QZkM3cCS8KinL

Entry address:
0x1BB4

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, E0, 73, 40, 00, 33, F6, C6, 44, 24, 14, 20, E8, DC, 51, 00, 00, 53, E8, 50, FD, FF, FF, 59, FF, 15, 50, 77, 40, 00, 68, 01, 80, 00, 00, FF, 15, 70, 70, 40, 00, 53, FF, 15, 4C, 77, 40, 00, 6A, 08, A3, 98, 2C, 42, 00, E8, B9, 09, 00, 00, 53, 68, 60, 01, 00, 00, A3, 00, 3D, 42, 00, 8D, 44, 24, 38, 50, 53, 68, 73, 74, 40, 00, FF, 15, 9C, 71, 40, 00, 68, 68, 74, 40, 00, 68, 00, 35, 42, 00, E8, AB, 08, 00, 00, FF, 15, 6C, 70, 40, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
24 KB (24,576 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to tlb.hwcdn.net  (69.16.175.10:80)

TCP (HTTP):
Connects to st-sh-us-dc3-001.s.dss.vg  (208.91.197.27:80)

TCP (HTTP):
Connects to server-54-240-190-28.jfk6.r.cloudfront.net  (54.240.190.28:80)

TCP (HTTP):
Connects to server-54-230-52-91.jfk6.r.cloudfront.net  (54.230.52.91:80)

TCP (HTTP):
Connects to server-54-230-52-245.jfk6.r.cloudfront.net  (54.230.52.245:80)

TCP (HTTP):
Connects to server-54-230-52-104.jfk6.r.cloudfront.net  (54.230.52.104:80)

TCP (HTTP):
Connects to server-54-192-55-20.jfk6.r.cloudfront.net  (54.192.55.20:80)

TCP (HTTP):
Connects to s3-1-w.amazonaws.com  (54.231.96.161:80)

TCP (HTTP SSL):
Connects to s3-1.amazonaws.com  (54.231.48.131:443)

TCP (HTTP):
Connects to ec2-54-208-23-129.compute-1.amazonaws.com  (54.208.23.129:80)

TCP (HTTP):
Connects to a23-67-250-106.deploy.static.akamaitechnologies.com  (23.67.250.106:80)

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):
Connects to a1plpkivs-v03.any.prod.ash1.secureserver.net  (72.167.239.239:80)

TCP (HTTP):
Connects to a184-26-44-105.deploy.static.akamaitechnologies.com  (184.26.44.105:80)

TCP (HTTP):
Connects to 50.22.63.140-static.reverse.softlayer.com  (50.22.63.140:80)

Remove setup.exe - Powered by Reason Core Security