downloadsetup.exe

File Monarch

This adware bundler is distributed through Adknowledge's advertising supported software managers. The application downloadsetup.exe, “Premium Installer ” by File Monarch has been detected as adware by 41 anti-malware scanners. The program is a setup application that uses the Adknowledge Fusion installer. This program installs potentially unwanted software on your PC at the same time as the software you are trying to install, without adequate consent. The file has been seen being downloaded from install.oinstaller5.com.
Publisher:
Premium Installer   (signed by File Monarch)

Product:
Premium Installer

Description:
Premium Installer

Version:
2.4.8.1

MD5:
3fd33260b1a6791ce1ccdb0bae01751b

SHA-1:
f1cb8b3f08f6fb1531c83901dd7840b383dbcc1e

SHA-256:
3ec2f82ba374dea13cab0556fa68ab2fdf33c9cedae569cd03f64b254c7d237d

Scanner detections:
41 / 68

Status:
Adware

Explanation:
Injects advertisements in the web browser in the form or banner ads and popups.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/26/2024 9:11:38 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.IBryte.9
5863612

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
2014.08.20

Avira AntiVirus
Adware/iBryte.bxop
7.11.167.238

avast!
Win32:PUP-gen [PUP]
150414-0

AVG
Adware AdPlugin.AAE
2014.0.4311

Baidu Antivirus
Trojan.Win32.Clikug
4.0.3.1554

Bitdefender
Trojan.GenericKD.1618449
1.0.20.620

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Strictor-72
0.98/20416

Comodo Security
Application.Win32.iBryte.WRP
18251

Dr.Web
Trojan.DownLoader11.31896
9.0.1.05190

Emsisoft Anti-Malware
Gen:Variant.Adware.IBryte
9.0.0.4799

ESET NOD32
Win32/AdWare.Agent.NNN (variant)
9.10280

Fortinet FortiGate
W32/Malware_fam.NB
5/4/2015

F-Prot
W32/A-c255719d
v6.4.7.1.166

F-Secure
Gen:Variant.Adware.IBryte
5.13.68

G Data
Trojan.GenericKD.1618449
15.5.24

herdProtect (fuzzy)
2015.8.2.17

IKARUS anti.virus
Trojan-Clicker.BFNI
t3scan.1.6.1.0

K7 AntiVirus
Riskware
13.176.11711

Kaspersky
not-a-virus:AdWare.Win32.iBryte
15.0.0.543

Malwarebytes
PUP.Optional.GigaClicks.A
v2015.05.04.03

McAfee
Artemis!0FF2B0F7AD04
5600.6775

Microsoft Security Essentials
TrojanClicker:Win32/Clikug.A
1.10401

MicroWorld eScan
Trojan.GenericKD.1618449
16.0.0.372

NANO AntiVirus
Trojan.Win32.Adpeak.cumkpw
0.28.0.59826

Norman
Gen:Variant.Application.Bundler.25
03.12.2014 13:20:04

nProtect
Trojan.GenericKD.1618449
14.04.10.01

Panda Antivirus
Trj/Genetic.gen
15.05.04.03

Qihoo 360 Security
Win32/Trojan.Dropper.c9f
1.0.0.1015

Quick Heal
TrojanDownloader.Badur.A5
5.15.14.00

Reason Heuristics
Threat.Adknowledge.Bundler
15.5.4.11

Rising Antivirus
PE:Malware.iBryte!6.192B
23.00.65.15502

Sophos
PUA 'iBryte Premium Installer' (of type Adware)
5.13

SUPERAntiSpyware
PUP.OptimumInstaller/Variant
9896

Trend Micro House Call
TROJ_CLIKUG.A
7.2.124

Trend Micro
TROJ_CLIKUG.A
10.465.04

Vba32 AntiVirus
Downloader.Agent
3.12.26.3

VIPRE Antivirus
Threat.4778314
32210

Zillya! Antivirus
Adware.iBryte.Win32.854
2.0.0.1790

File size:
142.4 KB (145,784 bytes)

Product version:
2.4.8.1

Copyright:
Copyright (C) Premium Installer

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Adknowledge Fusion

Language:
English (United States)

Common path:
C:\users\{user}\downloads\downloadsetup.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
3/18/2014 1:00:00 AM

Valid to:
3/19/2015 12:59:59 AM

Subject:
CN=File Monarch, O=File Monarch, STREET="4600 Madison Ave., FL 10", L=Kansas City, S=Missouri, PostalCode=64112, C=US

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00E65C750985B066CBB7B485ACF86E58B1

File PE Metadata
Compilation timestamp:
8/24/2014 11:05:49 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
1536:1GxYf8IUVv/CpeOFL8aXHXlZXLIvZ3oLLhjLmOiU6fEyPXXT0UdaYk:OYf8IUVv/dOFLX1ZbmZJLtAl

Entry address:
0x53A7

Entry point:
E8, 3C, 05, 00, 00, E9, 36, FD, FF, FF, 8B, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A3, F8, A1, 40, 00, 89, 0D, F4, A1, 40, 00, 89, 15, F0, A1, 40, 00, 89, 1D, EC, A1, 40, 00, 89, 35, E8, A1, 40, 00, 89, 3D, E4, A1, 40, 00, 66, 8C, 15, 10, A2, 40, 00, 66, 8C, 0D, 04, A2, 40, 00, 66, 8C, 1D, E0, A1, 40, 00, 66, 8C, 05, DC, A1, 40, 00, 66, 8C, 25, D8, A1, 40, 00, 66, 8C, 2D, D4, A1, 40, 00, 9C, 8F, 05, 08, A2, 40, 00, 8B, 45, 00, A3, FC, A1, 40, 00, 8B, 45, 04, A3, 00, A2, 40, 00, 8D, 45, 08, A3, 0C, A2, 40...
 
[+]

Code size:
20.5 KB (20,992 bytes)

The file downloadsetup.exe has been seen being distributed by the following URL.

Remove downloadsetup.exe - Powered by Reason Core Security