googlechromesetup.exe

App

Top Balance (New Media Holdings Ltd.)

The installer utilizes the installCore download manager which may bundle additional offers for various ad-supported toolbars, extensions and utilities. The application googlechromesetup.exe, “App Setup ” by Top Balance (New Media Holdings) has been detected as adware by 12 anti-malware scanners. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. With this installer, users are expecting to download Google's Chrome web browser but before that occurs they may be presented with additional offers, mostly potentially unwanted software or adware.
Publisher:
Software Internet   (signed by Top Balance (New Media Holdings Ltd.))

Product:
App

Description:
App Setup

MD5:
fd6dc17962113cab7436fa686631ece3

SHA-1:
e1c6b13d76aea1cbf91a98cc81f527f8424420c3

SHA-256:
2ac01a0fa422c2a9d31b49a4f447f419d029225b79505fc490a3a6548bc1c67b

Scanner detections:
12 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
11/15/2024 8:37:56 PM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
PUA/InstallCore.Gen4
8.3.1.6

AVG
Generic
2017.0.2853

Bkav FE
W32.HfsAdware
1.3.0.6379

Dr.Web
Trojan.InstallCore.152
9.0.1.026

ESET NOD32
Win32/InstallCore.XX potentially unwanted application
10.7.0.302.0

G Data
Win32.Application.InstallCore.EG
16.1.25

K7 AntiVirus
Unwanted-Program
13.205.16237

Malwarebytes
v2016.01.26.10

Panda Antivirus
PUP/Multitoolbar
16.01.26.10

Reason Heuristics
PUP.NewMedia.Installer.installCore.Installer (M)
16.1.26.10

Vba32 AntiVirus
Malware-Cryptor.InstallCore.gen
3.12.26.4

VIPRE Antivirus
Threat.4786018
40824

File size:
758.6 KB (776,840 bytes)

Product version:
2.0

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\microsoft\windows\temporary internet files\content.ie5\{random}\googlechromesetup.exe

Digital Signature
Authority:
GlobalSign nv-sa

Valid from:
2/11/2015 2:54:46 PM

Valid to:
2/12/2016 2:54:46 PM

Subject:
CN=Top Balance (New Media Holdings Ltd.), O=Top Balance (New Media Holdings Ltd.), L=Tel Aviv, C=IL

Issuer:
CN=GlobalSign CodeSigning CA - G2, O=GlobalSign nv-sa, C=BE

Serial number:
112195E753935A102CF246567B961877F414

File PE Metadata
Compilation timestamp:
6/19/1992 7:22:17 PM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:QLgp/8YM9YMp16ARTkOLhvCBJNWAE/YZdk+LU+umLNcPqTCl+ZXAmXHe1UOkhk8U:QLg18Zl1hRgOVEJNWAC0F1LNwjlOX3RY

Entry address:
0x9C40

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, 86, 94, FF, FF, E8, 8D, A6, FF, FF, E8, 1C, A9, FF, FF, E8, 53, C9, FF, FF, E8, 9A, C9, FF, FF, E8, C9, F2, FF, FF, E8, 30, F4, FF, FF, 33, C0, 55, 68, FC, A2, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, C5, A2, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 96, FE, FF, FF, E8, C9, FA, FF, FF, 8D, 55, F0, 33, C0, E8, 83, CF, FF, FF, 8B, 55, F0, B8, 24, CE, 40, 00, E8, 32, 95, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, 24, CE...
 
[+]

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
37 KB (37,888 bytes)

The file googlechromesetup.exe has been seen being distributed by the following URL.

Remove googlechromesetup.exe - Powered by Reason Core Security