chrome_setup.exe

WARP INSTALL

The software uses the Optimum Installer/Fusion Installer (Adknowledge) to download and install an offer stack of adware including toolbars, coupon extensions and various unwanted utilities. This installer is just a stub to present offers and download the expected software. The application chrome_setup.exe, “Premium Installer ” by WARP INSTALL has been detected as adware by 36 anti-malware scanners. The program is a setup application that uses the Adknowledge Fusion installer. This program installs potentially unwanted software on your PC at the same time as the software you are trying to install, without adequate consent. With this installer, users are expecting to download Google's Chrome web browser but before that occurs they may be presented with additional offers, mostly potentially unwanted software or adware.
Publisher:
Premium Installer   (signed by WARP INSTALL)

Product:
Premium Installer

Description:
Premium Installer

Version:
1.3.7.2

MD5:
5ace5263d98bb63d477b909c4095711d

SHA-1:
75373d06fc45e07905e8fe7646ff6847c3087ae4

SHA-256:
7a93a2ddef57c7056dc4dbd5224f75d3745965df093efd74ced0810d72f1f04e

Scanner detections:
36 / 68

Status:
Adware

Explanation:
This setup/installer bundles various adware components (toolbars, shopping extensions, utility offers).

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/18/2024 7:49:26 PM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.Downloader
7.1.1

AhnLab V3 Security
15.01.07

Avira AntiVirus
Adware/iBryte.qoemno
7.11.138.176

avast!
Win32:Adware-gen [Adw]
150102-1

AVG
Adware AdPlugin.FH
2014.0.4253

Bitdefender
Application.Bundler.Agent.B
1.0.20.35

Clam AntiVirus
Win.Trojan.Agent-736274
0.98/19168

Comodo Security
TrojWare.Win32.IBryte.S
17984

Dr.Web
Trojan.Packed.28561
9.0.1.05190

ESET NOD32
Win32/AdWare.iBryte.V.gen application
7.0.302.0

Fortinet FortiGate
Riskware/Generic.AC.13751
1/7/2015

F-Prot
W32/DomaIQ.G.gen
v6.4.7.1.166

F-Secure
Riskware.Gen:Variant.Application.Bundler
5.13.68

G Data
Win32.Application.PremiumInstaller
15.1.24

IKARUS anti.virus
not-a-virus:Downloader.Win32.Agent
t3scan.2.2.29

K7 AntiVirus
Unwanted-Program
13.176.11663

Kaspersky
not-a-virus:Downloader.Win32.Agent
15.0.0.543

Malwarebytes
v2015.01.07.10

McAfee
GenericATG-FGI!3B0404F8E1DE
5600.6893

MicroWorld eScan
Application.Bundler.Agent.B
16.0.0.21

NANO AntiVirus
Trojan.Win32.Downware.cvgamb
0.28.0.58491

nProtect
Trojan/W32.Badur.241952
14.06.27.01

Panda Antivirus
Trj/Genetic.gen
15.01.07.10

Qihoo 360 Security
Malware.QVM10.Gen
1.0.0.1015

Quick Heal
Adware.iBryte.DK4
1.15.14.00

Reason Heuristics
PUP.Installer.WARPINSTALL.M
15.1.7.10

Rising Antivirus
PE:Malware.iBryte!6.14B5
23.00.65.15105

Sophos
PUA 'iBryte Optimum Installer'
5.09

SUPERAntiSpyware
10130

Total Defense
Win32/Tnega.XABfAXD
37.0.10836

Vba32 AntiVirus
suspected of Trojan.Downloader.gen.h
3.12.24.3

VIPRE Antivirus
Trojan.Win32.Generic
27698

Zillya! Antivirus
Downloader.Agent.Win32.185140
2.0.0.1773

File size:
229.3 KB (234,784 bytes)

Product version:
1.3.7.2

Copyright:
Copyright (C) 2013 Premium Installer

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Adknowledge Fusion

Language:
English (United States)

Common path:
C:\users\{user}\downloads\chrome_setup.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
10/3/2013 5:00:00 PM

Valid to:
9/20/2014 4:59:59 PM

Subject:
CN=WARP INSTALL, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=WARP INSTALL, L=Kansas City, S=Missouri, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
52A35E3AC3B67E8CD7BB42D490658BBA

File PE Metadata
Compilation timestamp:
3/30/2014 6:00:18 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
3072:60EMU5s+QoYJitxd/53nEpWv201Ivl4TJq5tfqDGt5XV4pCPb:nZusJaxXw+201eq9oL3V4pCPb

Entry address:
0x101CB

Entry point:
E8, BC, 47, 00, 00, E9, 78, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, EC, 20, 8B, 45, 08, 56, 57, 6A, 08, 59, BE, A8, B2, 42, 00, 8D, 7D, E0, F3, A5, 89, 45, F8, 8B, 45, 0C, 5F, 89, 45, FC, 5E, 85, C0, 74, 0C, F6, 00, 08, 74, 07, C7, 45, F4, 00, 40, 99, 01, 8D, 45, F4, 50, FF, 75, F0, FF, 75, E4, FF, 75, E0, FF, 15, 60, B0, 42, 00, C9, C2, 08, 00, 8B, FF, 55, 8B, EC, 51, 53, 8B, 45, 0C, 83, C0, 0C, 89, 45, FC, 64, 8B, 1D, 00, 00, 00, 00, 8B, 03, 64, A3, 00, 00, 00, 00, 8B, 45, 08, 8B, 5D, 0C, 8B, 6D, FC, 8B, 63...
 
[+]

Entropy:
6.4023

Code size:
164.5 KB (168,448 bytes)

The file chrome_setup.exe has been seen being distributed by the following URL.

Remove chrome_setup.exe - Powered by Reason Core Security