setup.exe

TapGamez 2013 LTD

The application setup.exe by TapGamez 2013 has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. This is a setup and installation application and has been known to bundle potentially unwanted software. It is also typically executed from an Internet Explorer cache folder. The file has been seen being downloaded from kwa0eeyug5bk37.groopse.org. While running, it connects to the Internet address www.ibbalance.com on port 443.
Publisher:
Installer  (signed by TapGamez 2013 LTD)

Product:
Installer

Version:
1.48.0.0

MD5:
a84994609fa54268928aab6aee87f3bc

SHA-1:
ea2f8e8eefc1cdd54a0f76c74dfb95ca048e4dfd

SHA-256:
660cdcc80c64bf74fe81d6173bed88f33fd9f17077f498e8e7666e57daf1b01b

Scanner detections:
1 / 68

Status:
Potentially unwanted

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
4/19/2025 2:00:38 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.TapGamez.Installe.Installer (M)
16.5.8.14

File size:
409.3 KB (419,136 bytes)

Product version:
1.48.0.0

Copyright:
Copyright (C) 2014

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\microsoft\windows\temporary internet files\content.ie5\{random}\setup.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
12/15/2014 7:00:00 PM

Valid to:
12/16/2015 6:59:59 PM

Subject:
CN=TapGamez 2013 LTD, O=TapGamez 2013 LTD, STREET=1 habarzel st., L=tel aviv, S=israel, PostalCode=69710, C=IL

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00BD65286DA248840F6ECF8F4305066E9F

File PE Metadata
Compilation timestamp:
1/3/2015 3:16:20 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
12288:ZnDD9OqE4tqfqqzdLfqHSOGrqRZSjr3AcmAfmDdiUGI1n:JDD994zBfA/zjkzmAzcn

Entry address:
0x118D50

Entry point:
60, BE, 00, 70, 4C, 00, 8D, BE, 00, A0, F3, FF, 57, 83, CD, FF, EB, 10, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 75, D1, F8, 89...
 
[+]

Entropy:
7.8931

Packer / compiler:
UPX 2.90LZMA

Code size:
328 KB (335,872 bytes)

The file setup.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to www.softologic.com  (174.37.181.31:80)

TCP (HTTP SSL):
Connects to www.ibbalance.com  (173.192.190.227:443)

TCP (HTTP):

Remove setup.exe - Powered by Reason Core Security