chrome_setup.exe

INSTALL DOT EXE

This adware bundler is distributed through Adknowledge's advertising supported software managers. The application chrome_setup.exe, “Premium Installer ” by INSTALL DOT EXE has been detected as adware by 40 anti-malware scanners. The program is a setup application that uses the Adknowledge Fusion installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. With this installer, users are expecting to download Google's Chrome web browser but before that occurs they may be presented with additional offers, mostly potentially unwanted software or adware.
Publisher:
Premium Installer   (signed by INSTALL DOT EXE)

Product:
Premium Installer

Description:
Premium Installer

Version:
2.4.8.1

MD5:
0b2226abbd8673481814fd5f09f390b8

SHA-1:
e243b487dc48a98ed58230be784e6101b5aaf088

SHA-256:
fc13766a2a791906d91323ad87028daa663f8ff7a114acf68217ebc2aeca1acd

Scanner detections:
40 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/19/2024 9:27:31 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.Agent
7.1.1

AhnLab V3 Security
Trojan/Win32.Buzus
2014.02.09

Avira AntiVirus
Adware/iBryte.M
7.11.130.82

avast!
Win32:IBryte-CD [PUP]
2014.9-151121

AVG
Adware InstallCore.P
2016.0.2919

Baidu Antivirus
Adware.Win32.iBryte
4.0.3.151121

Bitdefender
Application.Generic.593289
1.0.20.1625

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Agent-6804
0.98/20218

Comodo Security
Application.Win32.iBryte.R
17759

Dr.Web
Adware.Downware.2165
9.0.1.0325

Emsisoft Anti-Malware
8.15.11.21.10

Fortinet FortiGate
Riskware/IBryte
11/21/2015

F-Prot
W32/Backdoor2.HTKO
v6.4.7.1.166

F-Secure
Riskware.Gen:Variant.Application.Bundler
11.2015-21-11_7

G Data
Win32.Application.OptimumInstaller
15.11.24

IKARUS anti.virus
Win32.AdWare
t3scan.2.2.29

K7 AntiVirus
Adware
13.176.11595

Kaspersky
HEUR:Trojan.Win32.Generic
14.0.0.1088

Malwarebytes
v2015.11.21.10

McAfee
Artemis!5032EA165D47
5600.6575

MicroWorld eScan
Application.Generic.593289
16.0.0.975

NANO AntiVirus
Trojan.Win32.Buzus.ctabuf
0.28.0.57630

nProtect
Trojan-Clicker/W32.iBryte.555816
14.05.09.01

Panda Antivirus
15.11.21.10

Qihoo 360 Security
HEUR/Malware.QVM10.Gen
1.0.0.1015

Quick Heal
Adware.iBryte.DK4
11.15.14.00

Reason Heuristics
PUP.Adknowledge.INSTALLDOTEXE.Installer (M)
15.11.21.10

Rising Antivirus
PE:PUF.PremiumInstaller!1.9F73
23.00.65.151119

Total Defense
Win32/Tnega.SRDMYD
37.0.10849

Trend Micro House Call
TROJ_GEN.F47V0127
7.2.325

Trend Micro
TROJ_BUZUS_DD30051C.UVPA
10.465.21

Vba32 AntiVirus
SScope.Malware-Cryptor.iBryte
3.12.24.3

VIPRE Antivirus
Optimum Installer
26304

Zillya! Antivirus
Trojan.Buzus.Win32.120232
2.0.0.1771

File size:
1.6 MB (1,679,144 bytes)

Product version:
2.4.8.1

Copyright:
Copyright (C) 2013 Premium Installer

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Adknowledge Fusion

Language:
English (United States)

Common path:
C:\users\{user}\downloads\chrome_setup.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
10/3/2013 5:00:00 PM

Valid to:
9/20/2014 4:59:59 PM

Subject:
CN=INSTALL DOT EXE, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=INSTALL DOT EXE, L=Kansas City, S=Missouri, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
4C8303B332693FCF64E1E7DFD7841493

File PE Metadata
Compilation timestamp:
1/29/2014 2:12:18 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
49152:X0/Z8Nl6ENiW5n2+thxH3sTBGr8kLc1ABGBd834:yZ8NYEARmvXsTurBBd34

Entry address:
0x373B5

Entry point:
E8, C2, 8C, 00, 00, E9, 78, FE, FF, FF, 6A, 0C, 68, B8, 6C, 47, 00, E8, C1, 35, 00, 00, 83, 65, E4, 00, 8B, 75, 08, 3B, 35, 78, 4A, 59, 00, 77, 22, 6A, 04, E8, C5, 8E, 00, 00, 59, 83, 65, FC, 00, 56, E8, 27, 9C, 00, 00, 59, 89, 45, E4, C7, 45, FC, FE, FF, FF, FF, E8, 09, 00, 00, 00, 8B, 45, E4, E8, CD, 35, 00, 00, C3, 6A, 04, E8, A8, 8D, 00, 00, 59, C3, 8B, FF, 55, 8B, EC, 83, 3D, D4, 36, 59, 00, 00, 75, 18, E8, F9, 81, 00, 00, 6A, 1E, E8, 21, 80, 00, 00, 68, FF, 00, 00, 00, E8, 37, 4D, 00, 00, 59, 59, A1...
 
[+]

Entropy:
7.0898

Code size:
397 KB (406,528 bytes)

The file chrome_setup.exe has been seen being distributed by the following URL.

Remove chrome_setup.exe - Powered by Reason Core Security