chrome_setup.exe

TINY INSTALLER

Tiny Installer is a download manager variant from Adknowledge that packages various adware-type offers (toolbar, coupon extensions, utilities) with software distributions. The application chrome_setup.exe, “Express Install ” by TINY INSTALLER has been detected as adware by 35 anti-malware scanners. The program is a setup application that uses the Adknowledge Fusion installer. This program installs potentially unwanted software on your PC at the same time as the software you are trying to install, without adequate consent. With this installer, users are expecting to download Google's Chrome web browser but before that occurs they may be presented with additional offers, mostly potentially unwanted software or adware.
Publisher:
Express Install   (signed by TINY INSTALLER)

Product:
Express Install

Description:
Express Install

Version:
3, 7, 1, 0

MD5:
ea867700abdef0402647a792a4d73b55

SHA-1:
d2e695ce4d1a5092e9f7a3eeeb234b5982267f87

SHA-256:
c4c5ef7d0e7e390c71303db18ed5fae6f28079ee1ec783b5d69594ed43ffde89

Scanner detections:
35 / 68

Status:
Adware

Explanation:
The Tiny Installer download manager bundles various adware components.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/23/2024 10:51:16 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Application.Bundler.OptimumInstaller.5
391

Agnitum Outpost
Trojan.Buzus
7.1.1

AhnLab V3 Security
2014.07.03

Avira AntiVirus
APPL/iBryte.Gen
7.11.141.64

avast!
IBryte-GJ [PUP]
2014.9-160110

AVG
Adware Skodna.Generic
2017.0.2869

Bitdefender
Trojan.GenericKDZ.23802
1.0.20.50

Bkav FE
W32.HfsAdware
1.3.0.6379

Comodo Security
Application.Win32.Adware.iBryte.BAA
18047

Dr.Web
Trojan.Packed.25017
9.0.1.010

Emsisoft Anti-Malware
8.16.01.10.08

ESET NOD32
Win32/Adware.iBryte.CB.Gen application
10.7.0.302.0

Fortinet FortiGate
Riskware/PremiumInstaller
1/10/2016

F-Prot
W32/S-352b3331
v6.4.7.1.166

F-Secure
Riskware.Gen:Variant.Application.Bundler
11.2016-10-01_1

G Data
Win32.Adware.IBryte
16.1.24

IKARUS anti.virus
PUA.TinyInstaller
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.176.11663

Kaspersky
not-a-virus:AdWare.Win32.iBryte
14.0.0.838

Malwarebytes
v2016.01.10.08

McAfee
Trojan.Artemis!A93FEF159410
5600.6525

MicroWorld eScan
Trojan.GenericKDZ.23802
17.0.0.30

NANO AntiVirus
Riskware.Win32.IBryte.csnugn
0.28.0.58873

Norman
Gen:Variant.Application.Bundler.OptimumInstaller.5
11.20160110

nProtect
Trojan-Clicker/W32.iBryte.1969448
14.04.04.01

Panda Antivirus
Trj/Genetic.gen
16.01.10.08

Qihoo 360 Security
Malware.QVM10.Gen
1.0.0.1015

Quick Heal
Adware.iBryte.EK4
1.16.14.00

Reason Heuristics
PUP.Adknowledge.TINYINSTALLER.Installer (M)
16.1.10.8

Rising Antivirus
PE:Trojan.Injector!1.9C6C
23.00.65.16108

Sophos
PUA 'iBryte Optimum Installer'
5.11

SUPERAntiSpyware
PUP.IBryte/Variant
9394

Vba32 AntiVirus
SScope.Malware-Cryptor.iBryte
3.12.26.3

VIPRE Antivirus
Trojan.Win32.Generic
28020

Zillya! Antivirus
Trojan.Buzus.Win32.119414
2.0.0.1773

File size:
1.7 MB (1,825,064 bytes)

Product version:
3, 7, 1, 0

Copyright:
Copyright (C) 2013 Express Install

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Adknowledge Fusion

Language:
English (United States)

Common path:
C:\users\{user}\downloads\chrome_setup.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
6/2/2013 8:00:00 PM

Valid to:
6/3/2014 7:59:59 PM

Subject:
CN=TINY INSTALLER, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=TINY INSTALLER, L=Wilmington, S=Delaware, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
54C184C0CB6B6510B3582483FC098463

File PE Metadata
Compilation timestamp:
10/16/2013 2:21:39 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
49152:+TkuR6cuVxhn7en5jriS7h5cu8yU/TS67:KRR6VVxhn77M+EUr

Entry address:
0x358C5

Entry point:
E8, 5E, 8C, 00, 00, E9, 78, FE, FF, FF, 6A, 0C, 68, F0, 4B, 47, 00, E8, C1, 35, 00, 00, 83, 65, E4, 00, 8B, 75, 08, 3B, 35, 18, 69, 5B, 00, 77, 22, 6A, 04, E8, 61, 8E, 00, 00, 59, 83, 65, FC, 00, 56, E8, C3, 9B, 00, 00, 59, 89, 45, E4, C7, 45, FC, FE, FF, FF, FF, E8, 09, 00, 00, 00, 8B, 45, E4, E8, CD, 35, 00, 00, C3, 6A, 04, E8, 44, 8D, 00, 00, 59, C3, 8B, FF, 55, 8B, EC, 83, 3D, 74, 55, 5B, 00, 00, 75, 18, E8, 99, 81, 00, 00, 6A, 1E, E8, C1, 7F, 00, 00, 68, FF, 00, 00, 00, E8, D7, 4C, 00, 00, 59, 59, A1...
 
[+]

Entropy:
7.1538

Code size:
390 KB (399,360 bytes)

The file chrome_setup.exe has been seen being distributed by the following URL.

Remove chrome_setup.exe - Powered by Reason Core Security