setup.exe

Time Lapse Solutions

The software will display additional offers (such as adware) during installation including a browser toolbar/extension as well as advertising injection software (part of the Injekt brand). The application setup.exe by Time Lapse Solutions has been detected as adware by 18 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. According to AVG, this software downloads additional adware offers during setup. It is also typically executed from the user's temporary directory. The file has been seen being downloaded from dbipa.reebdloc.com.
Publisher:
Time Lapse Solutions  (signed and verified)

MD5:
a5bdd80f29c33d49407e53623ed0afe5

SHA-1:
9004fb132a656315c9cfc609747ad8cbdec1154c

SHA-256:
03c6e976dfcf9f1397377738048cbe6e5a9bfa5f35ae1ef01912939b4d9c6432

Scanner detections:
18 / 68

Status:
Adware

Explanation:
Injects display ads (banner ads), in-text ads, interstitial ads, or other types of ads in the web browser as well as alters the browsers settings (home page, search, DNS, and security protocols).

Analysis date:
5/5/2024 2:45:34 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Generic.960732
595

Avira AntiVirus
ADWARE/Adware.Gen7
7.11.194.194

AVG
Downloader
2016.0.3073

Baidu Antivirus
Adware.MSIL.PullUpdate
4.0.3.15619

Bitdefender
Application.Generic.960732
1.0.20.850

Comodo Security
ApplicUnwnt
20343

ESET NOD32
MSIL/Adware.PullUpdate
9.10866

Fortinet FortiGate
Adware/PullUpdate
6/19/2015

F-Secure
Application.Generic.960732
11.2015-19-06_6

G Data
Application.Generic.960732
15.6.24

Malwarebytes
PUP.Optional.ZombieNews.A
v2015.06.19.05

McAfee
Artemis!A5BDD80F29C3
5600.6729

MicroWorld eScan
Application.Generic.960732
16.0.0.510

Qihoo 360 Security
HEUR/QVM10.1.Malware.Gen
1.0.0.1015

Reason Heuristics
PUP.Injekt.TimeLapseSolutions.Installer (M)
15.6.19.13

Sophos
Generic PUA KO
4.98

Trend Micro House Call
Suspici.7B6A9C43
7.2.170

VIPRE Antivirus
Injekt
35652

File size:
4.5 MB (4,682,128 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\setup.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
3/25/2014 1:00:00 AM

Valid to:
3/26/2015 12:59:59 AM

Subject:
CN=Time Lapse Solutions, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Time Lapse Solutions, L=St. James, S=St. James, C=BB

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
4E2D648A5233B2106CC4A2A6BE9F33FA

File PE Metadata
Compilation timestamp:
6/6/2009 11:41:48 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
98304:nEKOw9ddOZYsozvjkHiCjGPzfs2yjdqoT8FgbgnQ4365mwOw:nEtwLd6onmXdqoTsPnQu643w

Entry address:
0x30CB

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 38, 3F, 42, 00, E8, F1, 2B, 00, 00, A3, 84, 3E, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 30, F4, 41, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 80, 36, 42, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 90, 42, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Entropy:
7.9851

Packer / compiler:
Nullsoft install system v2.x

Code size:
22.5 KB (23,040 bytes)

The file setup.exe has been seen being distributed by the following URL.

Remove setup.exe - Powered by Reason Core Security