setup.exe

Generic App

Installer

The application setup.exe, “Generic App Setup ” has been detected as a potentially unwanted program by 5 anti-malware scanners. The program is a setup application that uses the installCore installer, however the file is not signed with an authenticode signature from a trusted source. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. The file has been seen being downloaded from bloodsport.blob.core.windows.net.
Publisher:
Installer

Product:
Generic App

Description:
Generic App Setup

MD5:
9f0b91499bff60eb1890d0aef79f91fa

SHA-1:
f929209f4a45ab453e69b8cf9ea7be1b48aff806

SHA-256:
65d4254340001550217ebeee5d0b2f2ce51eb3f0f638fd3e1d8392eca404667e

Scanner detections:
5 / 68

Status:
Potentially unwanted

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/26/2024 5:57:53 PM UTC  (today)

Scan engine
Detection
Engine version

Baidu Antivirus
Adware.Win32.InstallCore
4.0.3.151024

ESET NOD32
Win32/InstallCore.ACP.gen potentially unwanted (variant)
9.12282

Fortinet FortiGate
Riskware/InstallCore
10/24/2015

Malwarebytes
v2015.10.24.01

Reason Heuristics
PUP.InstallCore.Bundler (M)
15.10.24.9

File size:
440.1 KB (450,664 bytes)

Product version:
1.4.6

Copyright:
Generic

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\setup.exe

File PE Metadata
Compilation timestamp:
6/19/1992 7:22:17 PM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
6144:6/ydQPXydN58k4zpRMinuq6M6RPVdpNSI5jo49UY94UqTpZ5a6U8i7runjFGdN03:CydGXyVDY4VpnRPVdRRl7q3C8pJth

Entry address:
0xA5F8

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, CE, 8A, FF, FF, E8, D5, 9C, FF, FF, E8, 64, 9F, FF, FF, E8, 07, A0, FF, FF, E8, A6, BF, FF, FF, E8, 11, E9, FF, FF, E8, 78, EA, FF, FF, 33, C0, 55, 68, C9, AC, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, 92, AC, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 26, F5, FF, FF, E8, 11, F1, FF, FF, 80, 3D, 34, B2, 40, 00, 00, 74, 0C, E8, 23, F6, FF, FF, 33, C0, E8, C4, 97, FF, FF, 8D, 55, F0, 33, C0, E8, B6, C5, FF, FF, 8B, 55...
 
[+]

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
39.5 KB (40,448 bytes)

The file setup.exe has been seen being distributed by the following URL.

Remove setup.exe - Powered by Reason Core Security