ba40.tmp

File Monarch

This adware bundler is distributed through Adknowledge's advertising supported software managers. The file ba40.tmp, “Premium Installer ” by File Monarch has been detected as adware by 26 anti-malware scanners. The program is a setup application that uses the Adknowledge Fusion installer. This program installs potentially unwanted software on your PC at the same time as the software you are trying to install, without adequate consent. It is also typically executed from the user's temporary directory.
Publisher:
Premium Installer   (signed by File Monarch)

Product:
Premium Installer

Description:
Premium Installer

Version:
2.4.8.1

MD5:
5da73b3bd3c86306e5f4c4afa20b8895

SHA-1:
b2d74f0112d80d5c2a8a66366a50cf232f3b17f6

SHA-256:
cfc5a29c4c36205812c9128d0e94ea0fe91ea3540acd5b8c896a876dbb87f9c7

Scanner detections:
26 / 68

Status:
Adware

Explanation:
This installer bundles various adware prorgams that may include toolbars and web browser advertising injectors/extensions.

Description:
This is an installer which may bundle legitimate applications with offers for additional 3rd-party applications that may be unwanted by the user. While the installer contains an 'opt-out' feature this is not set be defult and is usually overlooked.

Analysis date:
5/18/2024 10:45:52 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Application.Bundler.15
852

Agnitum Outpost
Trojan.DownLoader
7.1.1

AhnLab V3 Security
2014.10.06

Avira AntiVirus
Adware/iBryte.bxop
7.11.176.180

avast!
Win32:IBryte-EX [PUP]
141003-0

AVG
Adware AdPlugin.AFH
2014.0.4037

Bitdefender
Gen:Variant.Application.Bundler.15
1.0.20.1390

Clam AntiVirus
Win.Adware.Application-459
0.98/19476

Comodo Security
Application.Win32.AgentCV.HWYE
19714

Dr.Web
Trojan.DownLoader11.31168
9.0.1.05190

Emsisoft Anti-Malware
Gen:Variant.Application.Bundler.15
14.10.05

ESET NOD32
Win32/AdWare.iBryte.BI application
7.0.302.0

F-Prot
W32/A-e3403a0b
v6.4.7.1.166

F-Secure
Gen:Variant.Application.Bundler
11.2014-05-10_1

G Data
Gen:Variant.Application.Bundler.15
14.10.24

IKARUS anti.virus
PUA.Bundler
t3scan.1.7.8.0

K7 AntiVirus
Unwanted-Program
13.183.13584

Kaspersky
not-a-virus:AdWare.Win32.iBryte
15.0.0.494

Malwarebytes
PUP.Optional.OptimunInstaller
v2014.10.05.08

MicroWorld eScan
Gen:Variant.Application.Bundler.15
15.0.0.834

NANO AntiVirus
Riskware.Win32.IBryte.deojtq
0.28.2.62440

Reason Heuristics
PUP.Installer.FileMonarch.H
14.10.5.20

Sophos
iBryte Premium Installer
4.98

Vba32 AntiVirus
3.12.26.3

VIPRE Antivirus
Threat.4778314
33624

Zillya! Antivirus
Adware.iBryte.Win32.1727
2.0.0.1944

File size:
141.4 KB (144,760 bytes)

Product version:
2.4.8.1

Copyright:
Copyright (C) Premium Installer

Bundler/Installer:
Adknowledge Fusion

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\ba40.tmp

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
3/18/2014 11:00:00 AM

Valid to:
3/19/2015 10:59:59 AM

Subject:
CN=File Monarch, O=File Monarch, STREET="4600 Madison Ave., FL 10", L=Kansas City, S=Missouri, PostalCode=64112, C=US

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00E65C750985B066CBB7B485ACF86E58B1

File PE Metadata
Compilation timestamp:
9/7/2014 7:15:15 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
3072:rrYcOvNxdJ1UYLpfKzYG9O1mMXrIakTCmynG:eLpfAYG9O1JG

Entry address:
0x93E7

Entry point:
E8, 4C, 05, 00, 00, E9, 36, FD, FF, FF, CC, FF, 25, B8, B1, 40, 00, FF, 25, 44, B1, 40, 00, CC, CC, 68, 59, 94, 40, 00, 64, FF, 35, 00, 00, 00, 00, 8B, 44, 24, 10, 89, 6C, 24, 10, 8D, 6C, 24, 10, 2B, E0, 53, 56, 57, A1, 1C, F0, 40, 00, 31, 45, FC, 33, C5, 50, 89, 65, E8, FF, 75, F8, 8B, 45, FC, C7, 45, FC, FE, FF, FF, FF, 89, 45, F8, 8D, 45, F0, 64, A3, 00, 00, 00, 00, C3, 8B, 4D, F0, 64, 89, 0D, 00, 00, 00, 00, 59, 5F, 5F, 5E, 5B, 8B, E5, 5D, 51, C3, 8B, FF, 55, 8B, EC, FF, 75, 14, FF, 75, 10, FF, 75, 0C...
 
[+]

Entropy:
6.0681

Code size:
39 KB (39,936 bytes)

Remove ba40.tmp - Powered by Reason Core Security