googlechromeupdatesetup.exe

File.org

The installer utilizes the installCore download manager which may bundle additional offers for various ad-supported toolbars, extensions and utilities. The application googlechromeupdatesetup.exe by File.org has been detected as a potentially unwanted program by 16 anti-malware scanners. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. With this installer, users are expecting to download Google's Chrome web browser but before that occurs they may be presented with additional offers, mostly potentially unwanted software or adware.
Publisher:
File.org  (signed and verified)

MD5:
db66e5312be20d8dfe61d75a6561739d

SHA-1:
980489db305d5b88fbaab28ddab8c0d2a3097a16

Scanner detections:
16 / 68

Status:
Potentially unwanted

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/26/2024 6:34:56 PM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
PUP/Win32.Downloader
2014.11.10

Avira AntiVirus
7.11.183.206

Comodo Security
ApplicUnwnt
20033

Dr.Web
Adware.Downware.4757
9.0.1.0327

ESET NOD32
Win32/InstallCore.QH (variant)
8.10695

Fortinet FortiGate
Riskware/InstallCore
11/23/2014

K7 AntiVirus
Unwanted-Program
13.185.13943

McAfee
Artemis!DB66E5312BE2
5600.6937

Qihoo 360 Security
Win32/Virus.Adware.f22
1.0.0.1015

Reason Heuristics
PUP.Installer.Fileorg.X
14.11.23.16

Trend Micro House Call
TROJ_GEN.R00JC0OJL14
7.2.327

Trend Micro
TROJ_GEN.R00JC0OJL14
10.465.23

Vba32 AntiVirus
Malware-Cryptor.InstallCore.gen
3.12.26.3

VIPRE Antivirus
Trojan.Win32.Generic
34640

Zillya! Antivirus
Adware.InstallCore.Win32.200
2.0.0.1977

File size:
709.4 KB (726,432 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Common path:
C:\Documents and Settings\{user}\Local settings\temp\googlechromeupdatesetup.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
4/25/2014 2:00:00 AM

Valid to:
4/26/2015 1:59:59 AM

Subject:
CN=File.org, O=File.org, STREET=Bysoestrade 2B st., L=Holbaek, S=N/A, PostalCode=4300, C=DK

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00E2D23668FD70A6AD497F37619358D967

File PE Metadata
Compilation timestamp:
6/20/1992 12:22:17 AM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:fGFaMME8sB5mU2aWbS77S9HjnyASXBxzrG736fKe2BnhKLvD+2N/CIDc:fGF1n8sB1/SpjnVS3zrGr6Ksn+2MIQ

Entry address:
0x9C40

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, 86, 94, FF, FF, E8, 8D, A6, FF, FF, E8, 1C, A9, FF, FF, E8, BF, A9, FF, FF, E8, 5E, C9, FF, FF, E8, C9, F2, FF, FF, E8, 30, F4, FF, FF, 33, C0, 55, 68, FC, A2, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, C5, A2, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 96, FE, FF, FF, E8, C9, FA, FF, FF, 8D, 55, F0, 33, C0, E8, 83, CF, FF, FF, 8B, 55, F0, B8, 24, CE, 40, 00, E8, 32, 95, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, 24, CE...
 
[+]

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
37 KB (37,888 bytes)

The file googlechromeupdatesetup.exe has been seen being distributed by the following 4 URLs.

http://file.org/.../dl.php?fid=21538072&p=pmfsb&a=upd&v=20130408

http://file.org/.../dl.php?fid=21538072&p=pmfsb&a=upd&v=20140325

Remove googlechromeupdatesetup.exe - Powered by Reason Core Security