zipsetup.exe

JumpyApps

The file is a bundle distribution and utilizes the installCore download manager to distribute this potentially unwanted software. The application zipsetup.exe by JumpyApps has been detected as adware by 16 anti-malware scanners. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions.
Publisher:
JumpyApps  (signed and verified)

MD5:
8e9c1b9a8ff8c6ae5ce0dce0ad827da8

SHA-1:
cd6ea0bddd3f26c80b5683eee8727cfa6e752bf4

SHA-256:
2394636f99a84fed822247cbc6547d6bb0d4d0d0aa926ec7b60c44672b3cb0f5

Scanner detections:
16 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This is an installer which may bundle legitimate applications with offers for additional 3rd-party applications that may be unwanted by the user. While the installer contains an 'opt-out' feature this is not set be defult and is usually overlooked.

Analysis date:
4/26/2024 4:26:56 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.GenericKD.1747879
935

Avira AntiVirus
7.11.160.194

Bitdefender
Trojan.GenericKD.1747879
1.0.20.980

Dr.Web
Trojan.Packed.24524
9.0.1.05190

Emsisoft Anti-Malware
Trojan.GenericKD.1747879
8.14.07.15.04

ESET NOD32
Win32/InstallCore.IP potentially unwanted application
7.0.302.0

F-Secure
Trojan.GenericKD.1747879
11.2014-15-07_3

G Data
Trojan.GenericKD.1747879
14.7.24

Malwarebytes
PUP.Optional.JumpyApps
v2014.07.15.04

MicroWorld eScan
Trojan.GenericKD.1747879
15.0.0.588

Qihoo 360 Security
Malware.QVM20.Gen
1.0.0.1015

Reason Heuristics
PUP.Installer.JumpyApps.L
14.8.7.18

Rising Antivirus
PE:Malware.XPACK-LNR/Heur!1.5594
23.00.65.14713

Vba32 AntiVirus
3.12.26.3

VIPRE Antivirus
Threat.4786018
31208

File size:
687.8 KB (704,272 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\zipsetup.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
2/18/2013 12:00:00 AM

Valid to:
2/18/2014 11:59:59 PM

Subject:
CN=JumpyApps, O=JumpyApps, STREET=63 Rothschild Blvd., L=Tel Aviv, S=NA, PostalCode=65785, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
6DB423F9C6473168CF486AAF112EDD5C

File PE Metadata
Compilation timestamp:
6/19/1992 11:22:17 PM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:vvp2sa/CYUlZo5fMRkzcCbafPoTf7/rkNY90VwPOc01tRyCAD:vvsjCqKZ+jIC0e29tRhS

Entry address:
0x9C40

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, 86, 94, FF, FF, E8, 8D, A6, FF, FF, E8, 1C, A9, FF, FF, E8, 53, C9, FF, FF, E8, 9A, C9, FF, FF, E8, C9, F2, FF, FF, E8, 30, F4, FF, FF, 33, C0, 55, 68, FC, A2, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, C5, A2, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 96, FE, FF, FF, E8, C9, FA, FF, FF, 8D, 55, F0, 33, C0, E8, 83, CF, FF, FF, 8B, 55, F0, B8, 24, CE, 40, 00, E8, 32, 95, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, 24, CE...
 
[+]

Entropy:
7.8094

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
37 KB (37,888 bytes)

Remove zipsetup.exe - Powered by Reason Core Security