chrome_setup.exe

INSTALL DOT EXE

This adware bundler is distributed through Adknowledge's advertising supported software managers. The application chrome_setup.exe, “Premium Installer ” by INSTALL DOT EXE has been detected as adware by 40 anti-malware scanners. The program is a setup application that uses the Adknowledge Fusion installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. With this installer, users are expecting to download Google's Chrome web browser but before that occurs they may be presented with additional offers, mostly potentially unwanted software or adware.
Publisher:
Premium Installer   (signed by INSTALL DOT EXE)

Product:
Premium Installer

Description:
Premium Installer

Version:
2.4.8.1

MD5:
2c97df376892cefc394af400f8ffacd7

SHA-1:
97a43bc8ffa126b092114d1d28867cd1d22492f7

SHA-256:
ed5bfc582f94dc4ea8b7eb5ccabd7949cee816562c3fbc6400eaec17e6113935

Scanner detections:
40 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/19/2024 4:26:05 PM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.Agent
7.1.1

AhnLab V3 Security
Trojan/Win32.Buzus
2014.02.09

Avira AntiVirus
Adware/iBryte.M
7.11.130.82

avast!
Win32:IBryte-CD [PUP]
2014.9-151231

AVG
Adware InstallCore.P
2016.0.2878

Baidu Antivirus
Adware.Win32.iBryte
4.0.3.151231

Bitdefender
Application.Generic.593289
1.0.20.1825

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Agent-6804
0.98/20218

Comodo Security
Application.Win32.iBryte.R
17759

Dr.Web
Adware.Downware.2165
9.0.1.0365

Emsisoft Anti-Malware
8.15.12.31.05

Fortinet FortiGate
Riskware/IBryte
12/31/2015

F-Prot
W32/Backdoor2.HTKO
v6.4.7.1.166

F-Secure
Riskware.Gen:Variant.Application.Bundler
11.2015-31-12_5

G Data
Win32.Application.OptimumInstaller
15.12.24

IKARUS anti.virus
Win32.AdWare
t3scan.2.2.29

K7 AntiVirus
Adware
13.176.11595

Kaspersky
HEUR:Trojan.Win32.Generic
14.0.0.886

Malwarebytes
v2015.12.31.05

McAfee
Artemis!5032EA165D47
5600.6534

MicroWorld eScan
Application.Generic.593289
16.0.0.1095

NANO AntiVirus
Trojan.Win32.Buzus.ctabuf
0.28.0.57630

nProtect
Trojan-Clicker/W32.iBryte.555816
14.05.09.01

Panda Antivirus
15.12.31.05

Qihoo 360 Security
HEUR/Malware.QVM10.Gen
1.0.0.1015

Quick Heal
Adware.iBryte.DK4
12.15.14.00

Reason Heuristics
PUP.Adknowledge.INSTALLDOTEXE.Installer (M)
15.12.31.17

Rising Antivirus
PE:PUF.PremiumInstaller!1.9F73
23.00.65.151229

Total Defense
Win32/Tnega.SRDMYD
37.0.10849

Trend Micro House Call
TROJ_GEN.F47V0127
7.2.365

Trend Micro
TROJ_BUZUS_DD30051C.UVPA
10.465.31

Vba32 AntiVirus
SScope.Malware-Cryptor.iBryte
3.12.24.3

VIPRE Antivirus
Optimum Installer
26304

Zillya! Antivirus
Trojan.Buzus.Win32.120232
2.0.0.1771

File size:
1.6 MB (1,708,840 bytes)

Product version:
2.4.8.1

Copyright:
Copyright (C) 2013 Premium Installer

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Adknowledge Fusion

Language:
English (United States)

Common path:
C:\users\{user}\downloads\chrome_setup.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
10/3/2013 7:00:00 PM

Valid to:
9/20/2014 6:59:59 PM

Subject:
CN=INSTALL DOT EXE, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=INSTALL DOT EXE, L=Kansas City, S=Missouri, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
4C8303B332693FCF64E1E7DFD7841493

File PE Metadata
Compilation timestamp:
2/5/2014 1:39:18 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
24576:/KXL0u//2w8oVlk3+xxuBWrWvkyxOXLO2m+IOHMzgiHpL9q3fBhNAQ+So0KatJEm:/KXL0u//n8WkHXALO2mNOszb9MCyJEih

Entry address:
0x385A5

Entry point:
E8, 3A, 8F, 00, 00, E9, 78, FE, FF, FF, 6A, 0C, 68, 28, 7D, 47, 00, E8, C1, 35, 00, 00, 83, 65, E4, 00, 8B, 75, 08, 3B, 35, 18, B8, 59, 00, 77, 22, 6A, 04, E8, 3D, 91, 00, 00, 59, 83, 65, FC, 00, 56, E8, 9F, 9E, 00, 00, 59, 89, 45, E4, C7, 45, FC, FE, FF, FF, FF, E8, 09, 00, 00, 00, 8B, 45, E4, E8, CD, 35, 00, 00, C3, 6A, 04, E8, 20, 90, 00, 00, 59, C3, 8B, FF, 55, 8B, EC, 83, 3D, 54, A4, 59, 00, 00, 75, 18, E8, 75, 84, 00, 00, 6A, 1E, E8, 9D, 82, 00, 00, 68, FF, 00, 00, 00, E8, 37, 4D, 00, 00, 59, 59, A1...
 
[+]

Entropy:
7.1062

Code size:
402.5 KB (412,160 bytes)

The file chrome_setup.exe has been seen being distributed by the following URL.

Remove chrome_setup.exe - Powered by Reason Core Security