setup.exe

App secure LLC

This is the Softpulse installer which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application setup.exe by App secure has been detected as adware by 27 anti-malware scanners. The program is a setup application that uses the Softpulse SoftwareBundler installer. This program installs potentially unwanted software on your PC at the same time as the software you are trying to install, without adequate consent.
Publisher:
App secure LLC  (signed and verified)

MD5:
03896d741c3bd6fefb4b8af4fec731c3

SHA-1:
7a4bfe82a9c2f47efbd347d954c4d9405a974708

SHA-256:
e394c906eff5e0fdc44709986ce7afdd31f2b674a42ffc571a596ec3e70839f6

Scanner detections:
27 / 68

Status:
Adware

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
5/4/2024 8:36:37 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Application.Bundler.51
5747488

Agnitum Outpost
PUA.SoftPulse
7.1.1

AhnLab V3 Security
PUP/Win32.SoftPulse
2015.06.19

Avira AntiVirus
PUA/Softpulse.rtfa
8.3.1.6

Arcabit
Trojan.Application.Bundler.51
1.0.0.425

AVG
AdPlugin
2016.0.3074

Bitdefender
Gen:Variant.Application.Bundler.51
1.0.20.845

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Trojan.Agent-883268
0.98/20578

Dr.Web
Trojan.Domaiq.175
9.0.1.05190

Emsisoft Anti-Malware
Gen:Variant.Application.Bundler.51
10.0.0.5366

ESET NOD32
Win32/SoftPulse.AH potentially unwanted application
7.0.302.0

F-Prot
W32/S-05a86dd4
v6.4.7.1.166

F-Secure
Riskware.Gen:Variant.Application.Bundler
5.14.151

G Data
Gen:Variant.Application.Bundler.51
15.6.25

K7 AntiVirus
Unwanted-Program
13.205.16287

Kaspersky
not-a-virus:HEUR:AdWare.Win32.SoftPulse
15.0.0.543

Malwarebytes
PUP.Optional.Softonic.SID.C
v2015.06.18.12

MicroWorld eScan
Gen:Variant.Application.Bundler.51
16.0.0.507

NANO AntiVirus
Trojan.Win32.Domaiq.dsubup
0.30.24.2086

Norman
Gen:Variant.Application.Bundler.51
02.06.2015 14:23:46

Panda Antivirus
Trj/Genetic.gen
15.06.18.12

Reason Heuristics
PUP.Softpulse.Bundler
15.6.18.8

Rising Antivirus
PE:Malware.Graftor!6.2586
23.00.65.15616

Sophos
PUA 'SoftPulse' (of type Adware)
5.15

Vba32 AntiVirus
Signed-Adware.Softpulse
3.12.26.4

VIPRE Antivirus
Threat.4783235
40830

File size:
570.3 KB (583,944 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Softpulse SoftwareBundler

Common path:
C:\users\{user}\downloads\setup.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
12/16/2014 4:00:00 PM

Valid to:
12/17/2015 3:59:59 PM

Subject:
CN=App secure LLC, O=App secure LLC, L=Wilmington, S=Delaware, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
5D0A1845D85007CD040B350F48C5F721

File PE Metadata
Compilation timestamp:
6/12/2015 2:10:35 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
12288:01khEYGha2bqs/zdSPe5h8yaoTmXAdyBmzErRcNW+6y7vkeY:01gr2n/zdSzGTmw8ozWr+6E8eY

Entry address:
0x1000

Entry point:
B8, 48, FD, 5C, 00, 50, 64, FF, 35, 00, 00, 00, 00, 64, 89, 25, 00, 00, 00, 00, 33, C0, 89, 08, 50, 45, 43, 6F, 6D, 70, 61, 63, 74, 32, 00, 0A, 54, E6, 2B, 19, 27, 7C, 0A, C0, 66, 4E, 8A, 35, 05, 5F, 48, EB, D8, 87, 74, 62, 2E, 07, AB, CF, 46, 98, F9, A7, E7, 81, 57, BC, 6D, E1, D2, 86, 21, D4, 5D, 2E, 66, EB, 05, C6, D0, 83, B7, DE, 83, 1B, 00, 5E, 20, 6C, 2F, F8, F2, C7, CC, 94, 16, 19, 51, 80, B6, 79, 86, 7D, 7F, DD, F3, A5, D0, 1A, 31, 8C, 02, 57, 45, CC, 75, 5E, A5, 57, 97, DB, 14, 30, B9, 13, 8D, F7...
 
[+]

Entropy:
7.9534

Packer / compiler:
PECompact v2

Code size:
1.2 MB (1,253,376 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to lga25s41-in-f232.1e100.net  (216.58.219.232:443)

TCP (HTTP):
Connects to ec2-52-25-196-249.us-west-2.compute.amazonaws.com  (52.25.196.249:80)

TCP (HTTP):

TCP (HTTP):
Connects to a23-13-165-163.deploy.static.akamaitechnologies.com  (23.13.165.163:80)

Remove setup.exe - Powered by Reason Core Security