setup.exe

Volonet Ltd

The installer utilizes the installCore download manager which may bundle additional offers for various ad-supported toolbars, extensions and utilities. The application setup.exe, “Powered by InstallCore” by Volonet has been detected as adware by 21 anti-malware scanners. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions.
Publisher:
Funmoods  (signed by Volonet Ltd)

Product:
Funmoods

Description:
Powered by InstallCore

Version:
2.0.1.0

MD5:
29b045611e9144056e9c0664ef6c93f5

SHA-1:
8cff75d011f61b2dfa5cee8a42058630a917afdb

SHA-256:
449ab8ea9789c43fcf7e5c1c9b9c93658fc67dc02da3a7d6bb6f915b7d78eb45

Scanner detections:
21 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/26/2024 4:43:08 AM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
7.11.214.168

avast!
Win32:Adware-gen [Adw]
2014.9-160108

AVG
InstallCore
2017.0.2871

Bitdefender
Gen:Variant.Application.InstallCore.4
1.0.20.40

Comodo Security
UnclassifiedMalware
21332

Dr.Web
Adware.InstallCore.15
9.0.1.08

Emsisoft Anti-Malware
Riskware.Win32.InstallCore.AMN!A2
8.16.01.08.05

ESET NOD32
Win32/InstallCore.G potentially unwanted (variant)
10.11285

Fortinet FortiGate
W32/InstallCore.A
1/8/2016

F-Secure
Gen:Variant.Application.InstallCore.4
11.2016-08-01_6

G Data
Gen:Variant.Application.InstallCore
16.1.22

K7 AntiVirus
Trojan
13.200.15196

Kaspersky
not-a-virus:HEUR:AdWare.Win32.InstallCore
14.0.0.849

Malwarebytes
PUP.FunMoods
v2016.01.08.05

McAfee
Artemis!3E1DBC98605C
5600.6527

nProtect
Trojan-Clicker/W32.Agent.607832.B
15.03.06.01

Qihoo 360 Security
HEUR/QVM11.1.Malware.Gen
1.0.0.1015

Reason Heuristics
PUP.installCore.Volonet.Installer (M)
16.1.8.5

Rising Antivirus
PE:Trojan.Win32.Generic.12C2047A!314705018
23.00.65.16106

Sophos
Install Core Installer
4.98

Vba32 AntiVirus
BScope.Malware-Cryptor.Sinba.C
3.12.26.3

File size:
592.5 KB (606,672 bytes)

Product version:
2.0.1.73

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore

Common path:
C:\users\{user}\downloads\setup.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
1/10/2012 8:00:00 PM

Valid to:
11/25/2013 7:59:59 PM

Subject:
CN=Volonet Ltd, O=Volonet Ltd, STREET=hazfira 19, L=Tel Aviv, S=Israel, PostalCode=67778, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00D9EB879A7F4ADB713BB56F5D9EA449DA

File PE Metadata
Compilation timestamp:
6/19/1992 6:22:17 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:/4pecsd5vm0J4wgOS4S4x7c0A01G2yON1DU+Lr9ApCo7E:/Ac5vfCBTp4C0AJ2yONBU+LipCo7E

Entry address:
0x144F20

Entry point:
60, BE, 00, 10, 4C, 00, 8D, BE, 00, 00, F4, FF, C7, 87, 10, 87, 0C, 00, 33, 8F, 2E, 10, 57, 83, CD, FF, EB, 0E, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46...
 
[+]

Packer / compiler:
UPX v0.89.6 - v1.02 / v1.05 -v1.22 (Delphi) stub

Code size:
532 KB (544,768 bytes)

Remove setup.exe - Powered by Reason Core Security