chrome_setup.exe

File Monarch

This adware bundler is distributed through Adknowledge's advertising supported software managers. The application chrome_setup.exe, “Premium Installer ” by File Monarch has been detected as adware by 36 anti-malware scanners. The program is a setup application that uses the Adknowledge Fusion installer. This program installs potentially unwanted software on your PC at the same time as the software you are trying to install, without adequate consent. With this installer, users are expecting to download Google's Chrome web browser but before that occurs they may be presented with additional offers, mostly potentially unwanted software or adware.
Publisher:
Premium Installer   (signed by File Monarch)

Product:
Premium Installer

Description:
Premium Installer

Version:
2.4.8.1

MD5:
e92df0cc71b104fa772898c6d5d6c301

SHA-1:
6dde1955f427e787f82fc8f28c8dd3b62c814f33

SHA-256:
bed907a409c20d622a97de0e20c6d29797503b48bff03825ee03008ad63cc85b

Scanner detections:
36 / 68

Status:
Adware

Explanation:
This installer bundles various adware prorgams that may include toolbars and web browser advertising injectors/extensions.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/18/2024 2:44:14 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Downloader.TM
435

Agnitum Outpost
PUA.iBryte
7.1.1

AhnLab V3 Security
2014.08.31

Avira AntiVirus
APPL/Downloader.TM
7.11.167.130

avast!
Win32:IBryte-EF [PUP]
2014.9-151126

AVG
Adware AdPlugin
2016.0.2913

Bitdefender
Application.Downloader.TM
1.0.20.1650

Bkav FE
W32.VikesluLTAH.Adware
1.3.0.4959

Clam AntiVirus
Win.Adware.Agent-8702
0.98/20552

Comodo Security
Application.Win32.AgentCV.HWYE
19181

Dr.Web
Adware.iBryte.483
9.0.1.0330

Emsisoft Anti-Malware
Gen:Variant.Application.Bundler.15
8.15.11.26.09

ESET NOD32
Win32/AdWare.iBryte.AX application
9.7.0.302.0

Fortinet FortiGate
W32/Buzus.VCEW!tr
11/26/2015

F-Prot
W32/A-34fffba4
v6.4.7.1.166

F-Secure
Application.Downloader.TM
11.2015-26-11_5

G Data
Application.Downloader.TM
15.11.24

IKARUS anti.virus
AdWare.AdPlugin
t3scan.1.7.5.0

K7 AntiVirus
Unwanted-Program
13.183.13286

Kaspersky
not-a-virus:AdWare.Win32.iBryte
14.0.0.1061

Malwarebytes
PUP.Optional.OptimunInstaller
v2015.11.26.09

McAfee
Trojan.Artemis!93008101341C
5600.6569

MicroWorld eScan
Application.Downloader.TM
16.0.0.990

NANO AntiVirus
Trojan.Win32.Buzus.ddthma
0.28.2.61519

Norman
IBryte.PDB
11.20151126

nProtect
Trojan-Clicker/W32.iBryte.126328.B
14.09.05.01

Panda Antivirus
Trj/Genetic.gen
15.11.26.09

Quick Heal
TrojanDownloader.Badur.A5
11.15.14.00

Reason Heuristics
PUP.Adknowledge.FileMonarch.Bundler (M)
15.11.26.21

Rising Antivirus
PE:Malware.iBryte!6.1A9D
23.00.65.151124

Sophos
iBryte Premium Installer
4.98

SUPERAntiSpyware
Adware.iBryte/Variant
9483

Total Defense
Win32/Tnega.WOITIaD
37.1.62.1

Vba32 AntiVirus
Downloader.Agent
3.12.26.3

VIPRE Antivirus
Threat.4778314
32186

Zillya! Antivirus
Downloader.Agent.Win32.215091
2.0.0.1913

File size:
142.4 KB (145,784 bytes)

Product version:
2.4.8.1

Copyright:
Copyright (C) Premium Installer

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Adknowledge Fusion

Language:
English (United States)

Common path:
C:\users\{user}\downloads\chrome_setup.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
3/17/2014 5:00:00 PM

Valid to:
3/18/2015 4:59:59 PM

Subject:
CN=File Monarch, O=File Monarch, STREET="4600 Madison Ave., FL 10", L=Kansas City, S=Missouri, PostalCode=64112, C=US

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00E65C750985B066CBB7B485ACF86E58B1

File PE Metadata
Compilation timestamp:
8/22/2014 1:19:42 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
1536:ktuxYf8IUZv/CpjOFL8aXHXlZXLIvZ3oLLhjLmOiU6fEyPXXT0U+e1W:k+Yf8IUZv/gOFLX1ZbmZJLtPI

Entry address:
0x53A7

Entry point:
E8, 3C, 05, 00, 00, E9, 36, FD, FF, FF, 8B, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A3, F8, A1, 40, 00, 89, 0D, F4, A1, 40, 00, 89, 15, F0, A1, 40, 00, 89, 1D, EC, A1, 40, 00, 89, 35, E8, A1, 40, 00, 89, 3D, E4, A1, 40, 00, 66, 8C, 15, 10, A2, 40, 00, 66, 8C, 0D, 04, A2, 40, 00, 66, 8C, 1D, E0, A1, 40, 00, 66, 8C, 05, DC, A1, 40, 00, 66, 8C, 25, D8, A1, 40, 00, 66, 8C, 2D, D4, A1, 40, 00, 9C, 8F, 05, 08, A2, 40, 00, 8B, 45, 00, A3, FC, A1, 40, 00, 8B, 45, 04, A3, 00, A2, 40, 00, 8D, 45, 08, A3, 0C, A2, 40...
 
[+]

Entropy:
5.4410

Code size:
20.5 KB (20,992 bytes)

Remove chrome_setup.exe - Powered by Reason Core Security