setup.exe

Digital Plugin S.l.

This is the Softpulse installer which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application setup.exe by Digital Plugin S.l has been detected as adware by 30 anti-malware scanners. The program is a setup application that uses the Softpulse SoftwareBundler installer. This program installs potentially unwanted software on your PC at the same time as the software you are trying to install, without adequate consent. The file has been seen being downloaded from kyle.mxp2362.com.
Publisher:
Digital Plugin S.l.  (signed and verified)

MD5:
2a0ef5bd934816e958f328df0ac5fb67

SHA-1:
2b1691ffbd2e945122bf2c1f1930e6a466330c05

SHA-256:
90240e43658a32e28c3abbbe437e7a690e02424290bf6e504de741bea4119b08

Scanner detections:
30 / 68

Status:
Adware

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/26/2024 1:19:37 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Bundler.DomaIQ.T
851

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
Win-Trojan/Inject.1526984
2014.10.07

Avira AntiVirus
APPL/Softpulse.Gen8
7.11.177.24

avast!
Win32:SoftPulse-AH [PUP]
141003-0

AVG
Found Win32/DH{gRJ UIEHeVRPFVGBFYEJHFOBE0GBDw}
2014.0.4037

Bitdefender
Application.Bundler.DomaIQ.T
1.0.20.1400

Clam AntiVirus
Win.Trojan.Softpulse-40
0.98/21411

Comodo Security
Application.Win32.SoftPulse.GEE
19731

Dr.Web
Trojan.DownLoader11.30734
9.0.1.05190

Emsisoft Anti-Malware
Application.Bundler.DomaIQ.T
14.10.07

ESET NOD32
Win32/SoftPulse (variant)
8.10523

F-Prot
W32/A-3c050bc3
v6.4.7.1.166

F-Secure
Application.Bundler.DomaIQ
11.2014-07-10_3

G Data
Application.Bundler.DomaIQ
14.10.24

IKARUS anti.virus
not-a-virus:Downloader.Agent
t3scan.1.7.8.0

K7 AntiVirus
Unwanted-Program
13.183.13597

Kaspersky
not-a-virus:AdWare.Win32.Agent
15.0.0.494

Malwarebytes
PUP.Optional.DomaIQ
v2014.10.07.08

McAfee
Socrydo
5600.6985

MicroWorld eScan
Application.Bundler.DomaIQ.T
15.0.0.840

NANO AntiVirus
Riskware.Win32.SoftPulse.deniau
0.28.2.62483

Norman
Malware
11.20141007

nProtect
Trojan-Clicker/W32.Agent.1527000
14.10.06.01

Panda Antivirus
Trj/Genetic.gen
14.10.07.08

Reason Heuristics
PUP.Installer.DigitalPluginSl.F
14.10.7.8

Sophos
SoftPulse
4.98

Vba32 AntiVirus
Downloader.Agent
3.12.26.3

VIPRE Antivirus
Threat.4150696
33706

Zillya! Antivirus
Adware.Agent.Win32.12175
2.0.0.1945

File size:
1.5 MB (1,527,000 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Softpulse SoftwareBundler

Common path:
C:\documents and settings\kourty\mes documents\downloads\setup.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
7/14/2014 2:00:00 AM

Valid to:
7/15/2015 1:59:59 AM

Subject:
CN=Digital Plugin S.l., O=Digital Plugin S.l., L=Guia de Isora, S=Santa Cruz de Tenerife, C=ES

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
229111B20CCF13394E8E6CA9EAB4121F

File PE Metadata
Compilation timestamp:
9/4/2014 9:32:09 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
24576:m5IM/V0deM5lZ2ykPYMkrQ1OrWaRyv2PBcSL+L5/+FMoQl/ugQWiBdrfO+a+c:cIBfvMkrNrf0u3qdaNLgQWiO+8

Entry address:
0x5A07

Entry point:
E8, 41, 2A, 00, 00, E9, 7F, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 8B, 4C, 24, 04, F7, C1, 03, 00, 00, 00, 74, 24, 8A, 01, 83, C1, 01, 84, C0, 74, 4E, F7, C1, 03, 00, 00, 00, 75, EF, 05, 00, 00, 00, 00, 8D, A4, 24, 00, 00, 00, 00, 8D, A4, 24, 00, 00, 00, 00, 8B, 01, BA, FF, FE, FE, 7E, 03, D0, 83, F0, FF, 33, C2, 83, C1, 04, A9, 00, 01, 01, 81, 74, E8, 8B, 41, FC, 84, C0, 74, 32, 84, E4, 74, 24, A9, 00, 00, FF, 00, 74, 13, A9, 00, 00, 00, FF, 74, 02, EB, CD, 8D, 41, FF, 8B...
 
[+]

Code size:
60 KB (61,440 bytes)

The file setup.exe has been seen being distributed by the following URL.

Remove setup.exe - Powered by Reason Core Security