How to remove RusWordSetup.exe

RusWordSetup.exe

The module RusWordSetup.exe has been detected as PUP.Yandex

RusWordSetup.exe

RusWordSetup.exe is a Windows file recorded in the ThreatInfo database. It is associated with RusWord установщк . The reported company name is ООО ИТВА . The current detection status is PUP.Yandex, based on the latest analysis from 2023-04-21 23:09:55 (3 years ago).

If RusWordSetup.exe appears on your computer unexpectedly, treat it as suspicious. Check its location, digital signature, and recent system changes before allowing it to run. A full anti-malware scan is recommended when this file is detected as PUP.Yandex.

Product Name: RusWord установщк
Company Name: ООО ИТВА
MD5: 6eb7e18119ba8f4af2c24b964d7f9e29
Size: 11 MB
First Published: 2023-04-21 23:09:55 (3 years ago)
Latest Published: 2023-04-21 23:09:55 (3 years ago)
Status: PUP.Yandex (on last analysis)
Analysis Date: 2023-04-21 23:09:55 (3 years ago)
Signed By: ООО ИТВА
Status: Valid

The signature on RusWordSetup.exe is reported as valid. A valid signature helps confirm publisher identity, but it does not automatically make the file safe if the installer was bundled, abused, or downloaded from an untrusted source.

%desktop%

ThreatInfo has observed RusWordSetup.exe in the locations listed above. Files found in temporary folders, user profile folders, startup locations, or unusual application directories should be reviewed more carefully than files installed under a known program directory.

100.0%

The strongest geographic signal for this file is Russian Federation with 100.0% of observed hits. Geographic distribution can help identify targeted campaigns, regional software bundles, or where a file is most commonly reported.

Windows 10 100.0%

The most common operating system signal for RusWordSetup.exe is Windows 10 with 100.0% of observed hits. If your system differs from the common profile, check whether the file was introduced by a specific installer, archive, or removable device.

RusWordSetup.exe is identified as pe for 32 systems. The subsystem is Windows GUI. PE header values are useful for triage, especially when they do not match the expected publisher, product, or release timeline.

Subsystem: Windows GUI
PE Type: pe
OS Bitness: 32
Image Base: 0x00400000
Entry Address: 0x000a7ed0

PE Sections:

Name Size of data MD5
.text 676352 d2d65fadb7b1be676e1248ab404382da
.itext 6144 73e002411a8e0d309143a3e055e89568
.data 14336 43e7b93b56ed2b1f2c341832da76e1f0
.bss 0 d41d8cd98f00b204e9800998ecf8427e
.idata 4096 daddecfdccd86a491d85012d9e547c63
.didata 512 be0581a07bd7d21a29f93f8752d3e826
.edata 512 57cd71ca96fdc064696777e5b35cf0bb
.tls 0 d41d8cd98f00b204e9800998ecf8427e
.rdata 512 967e84eb6ac477621cd1643650d7bc91
.rsrc 399360 0c1048d65d7c1c81d4f911dfe219d4c1

PE section names and hashes can reveal packing, injected resources, or unusual build artifacts. Sections with uncommon names, very large raw data, or hashes that differ from a trusted copy deserve additional review.

More information:

Download GridinSoft Anti-Malware - Removal tool for RusWordSetup.exe