chrome_setup.exe

INSTALL DOT EXE

This adware bundler is distributed through Adknowledge's advertising supported software managers. The application chrome_setup.exe, “Premium Installer ” by INSTALL DOT EXE has been detected as adware by 40 anti-malware scanners. The program is a setup application that uses the Adknowledge Fusion installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. With this installer, users are expecting to download Google's Chrome web browser but before that occurs they may be presented with additional offers, mostly potentially unwanted software or adware.
Publisher:
Premium Installer   (signed by INSTALL DOT EXE)

Product:
Premium Installer

Description:
Premium Installer

Version:
2.4.8.1

MD5:
4064c074eb77f851d1baa3b1dd44b8ab

SHA-1:
8cd75e00bc95cf4dc242155a42ba5d78f6881f9c

SHA-256:
734e57eafec43b911856d2afefe83fcdc2c41fd3cc8949066608732a0732650e

Scanner detections:
40 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
5/7/2024 8:17:17 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.Agent
7.1.1

AhnLab V3 Security
Trojan/Win32.Buzus
2014.02.09

Avira AntiVirus
Adware/iBryte.M
7.11.130.82

avast!
Win32:IBryte-CD [PUP]
2014.9-160214

AVG
Adware InstallCore.P
2017.0.2833

Baidu Antivirus
Adware.Win32.iBryte
4.0.3.16214

Bitdefender
Application.Generic.593289
1.0.20.225

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Agent-6804
0.98/20218

Comodo Security
Application.Win32.iBryte.R
17759

Dr.Web
Adware.Downware.2165
9.0.1.045

Emsisoft Anti-Malware
8.16.02.14.12

ESET NOD32
10.7.0.302.0

Fortinet FortiGate
Riskware/IBryte
2/14/2016

F-Prot
W32/Backdoor2.HTKO
v6.4.7.1.166

F-Secure
Riskware.Gen:Variant.Application.Bundler
11.2016-14-02_1

G Data
Win32.Application.OptimumInstaller
16.2.24

IKARUS anti.virus
Win32.AdWare
t3scan.2.2.29

K7 AntiVirus
Adware
13.176.11595

Kaspersky
HEUR:Trojan.Win32.Generic
14.0.0.662

Malwarebytes
v2016.02.14.12

McAfee
Artemis!5032EA165D47
5600.6489

MicroWorld eScan
Application.Generic.593289
17.0.0.135

NANO AntiVirus
Trojan.Win32.Buzus.ctabuf
0.28.0.57630

nProtect
Trojan-Clicker/W32.iBryte.555816
14.05.09.01

Panda Antivirus
16.02.14.12

Qihoo 360 Security
HEUR/Malware.QVM10.Gen
1.0.0.1015

Quick Heal
Adware.iBryte.DK4
2.16.14.00

Reason Heuristics
PUP.Adknowledge.INSTALLDOTEXE.Installer (M)
16.2.14.12

Rising Antivirus
PE:PUF.PremiumInstaller!1.9F73
23.00.65.16212

Total Defense
Win32/Tnega.SRDMYD
37.0.10849

Trend Micro House Call
TROJ_GEN.F47V0127
7.2.45

Trend Micro
TROJ_BUZUS_DD30051C.UVPA
10.465.14

Vba32 AntiVirus
SScope.Malware-Cryptor.iBryte
3.12.24.3

VIPRE Antivirus
Optimum Installer
26304

Zillya! Antivirus
Trojan.Buzus.Win32.120232
2.0.0.1771

File size:
2.6 MB (2,677,544 bytes)

Product version:
2.4.8.1

Copyright:
Copyright (C) 2013 Premium Installer

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Adknowledge Fusion

Language:
English (United States)

Common path:
C:\users\{user}\downloads\chrome_setup.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
10/3/2013 5:00:00 PM

Valid to:
9/20/2014 4:59:59 PM

Subject:
CN=INSTALL DOT EXE, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=INSTALL DOT EXE, L=Kansas City, S=Missouri, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
4C8303B332693FCF64E1E7DFD7841493

File PE Metadata
Compilation timestamp:
12/31/2013 8:25:49 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
49152:0ZLaRvYcIcI7xEBLW/4Zb5X/XL/EbCOa7801BzbBdQbY:waRAcIcI7xEpH/w4BzEbY

Entry address:
0x7B9F5

Entry point:
E8, BE, 8C, 00, 00, E9, 78, FE, FF, FF, 6A, 0C, 68, C0, AC, 4B, 00, E8, C1, 35, 00, 00, 83, 65, E4, 00, 8B, 75, 08, 3B, 35, D8, 83, 68, 00, 77, 22, 6A, 04, E8, C1, 8E, 00, 00, 59, 83, 65, FC, 00, 56, E8, 23, 9C, 00, 00, 59, 89, 45, E4, C7, 45, FC, FE, FF, FF, FF, E8, 09, 00, 00, 00, 8B, 45, E4, E8, CD, 35, 00, 00, C3, 6A, 04, E8, A4, 8D, 00, 00, 59, C3, 8B, FF, 55, 8B, EC, 83, 3D, 34, 70, 68, 00, 00, 75, 18, E8, F9, 81, 00, 00, 6A, 1E, E8, 21, 80, 00, 00, 68, FF, 00, 00, 00, E8, 37, 4D, 00, 00, 59, 59, A1...
 
[+]

Entropy:
7.2332

Code size:
670 KB (686,080 bytes)

The file chrome_setup.exe has been seen being distributed by the following URL.

Remove chrome_setup.exe - Powered by Reason Core Security