setup.exe

Anton Kulichenko

The is the installer for the WebPick InstalleRex download manager which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed without consent. The application setup.exe by Anton Kulichenko has been detected as adware by 29 anti-malware scanners. The program is a setup application that uses the WebPick InstalleRex installer. It is built using the Crossrider cross-browser extension platform. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider.
Publisher:
Anton Kulichenko  (signed and verified)

MD5:
1adc175bfd9c10145c23d2e7ed78bf22

SHA-1:
9e33d2ea0f217f8325744b6b1646238141758a59

SHA-256:
a27121384f3e70201ab4ff9466bbd9cd78022e2f941c3d0df6ca648d78411ea1

Scanner detections:
29 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
5/7/2024 8:00:18 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Dropper.101
835

Agnitum Outpost
PUA.MultiPlug
7.1.1

AhnLab V3 Security
Adware/Win32.BHO
2014.10.23

Avira AntiVirus
TR/Graftor.141601.A
7.11.180.174

avast!
Win32:MultiPlug-AA [PUP]
141023-1

AVG
Adware Generic_r.HY
2014.0.4040

Bitdefender
Gen:Variant.Adware.Dropper.101
1.0.20.1475

Clam AntiVirus
Win.Adware.Agent-6680
0.98/21411

Comodo Security
Application.Win32.Multiplug.GETF
19873

Dr.Web
Trojan.Crossrider.4243
9.0.1.05190

Emsisoft Anti-Malware
Gen:Variant.Adware.Dropper.101
14.10.22

ESET NOD32
Win32/AdWare.MultiPlug.R application
7.0.302.0

Fortinet FortiGate
Riskware/Generic.AC.1814531
10/22/2014

F-Prot
W32/MultiPlug.C.gen
v6.4.7.1.166

F-Secure
Gen:Variant.Adware.Dropper.101
11.2014-22-10_4

G Data
Gen:Variant.Adware.Dropper.101
14.10.24

IKARUS anti.virus
Win32.SuspectCrc
t3scan.1.7.8.0

K7 AntiVirus
Unwanted-Program
13.184.13741

Kaspersky
not-a-virus:HEUR:AdWare.Win32.Agent
14.0.0.3061

McAfee
PUP-FID
5600.6969

MicroWorld eScan
Gen:Variant.Adware.Dropper.101
15.0.0.885

NANO AntiVirus
Trojan.Win32.Crossrider.curnem
0.28.2.62841

Quick Heal
AdWare.MultiPlag.ace
10.14.14.00

Reason Heuristics
PUP.Installer.AntonKulichenko.F
14.10.22.17

Rising Antivirus
PE:Malware.MultiPlug!6.13CF
23.00.65.141020

Sophos
MultiPlug
4.98

Vba32 AntiVirus
AdWare.Win64.MultiPlag
3.12.26.3

VIPRE Antivirus
Threat.4150696
33706

Zillya! Antivirus
Trojan.Black.Win32.16992
2.0.0.1964

File size:
1.5 MB (1,617,112 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
WebPick InstalleRex

Common path:
C:\Program Files\vs revo group\revo uninstaller pro\setup.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
12/3/2013 2:00:00 AM

Valid to:
12/4/2014 1:59:59 AM

Subject:
CN=Anton Kulichenko, O=Anton Kulichenko, STREET=Engineering 7, L=Kiev, S=Kiev, PostalCode=01013, C=UA

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00E406368A873FE17B8962DA09A05F7B2E

File PE Metadata
Compilation timestamp:
3/3/2014 2:27:10 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
24576:8oiZSsgM4Uo3b4IJ0KeTydUShiuqumIMr7XcnGPf5W5wS26RN43lNg0hbp8/E:4ZoM6cgiY5uR7qaO2CMhbp8/E

Entry address:
0x10BAB

Entry point:
E8, BE, 4A, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 88, 21, 42, 00, E8, 9F, 21, 00, 00, E8, E0, 07, 00, 00, 0F, B7, F0, 6A, 02, E8, 51, 4A, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, 10, 38, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Code size:
103.5 KB (105,984 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to r1.stylezip.info  (54.186.255.26:80)

TCP (HTTP):
Connects to c1.stylezip.info  (54.186.255.26:80)

 
http://c1.stylezip.info/?step_id=1&installer_id=12330528&publisher_id=233&source_id=0&page_id=0&country_code=US&locale=US&browser_id=4&download_id=36991584&external_id=0&session_id=73983168&hardware_id=86313696&installer_file_name=setup

Remove setup.exe - Powered by Reason Core Security