fl_setup.exe

Click Accept

This adware bundler is distributed through Adknowledge's advertising supported software managers. The application fl_setup.exe, “Premium Installer ” by Click Accept has been detected as adware by 26 anti-malware scanners. The program is a setup application that uses the Adknowledge Fusion installer. The file has been seen being downloaded from install.oinstaller2.com and multiple other hosts.
Publisher:
Premium Installer   (signed by Click Accept)

Product:
Premium Installer

Description:
Premium Installer

Version:
2.4.8.1

MD5:
aa171b40030930297c37caa5d21691ed

SHA-1:
fce5cf495819eff1f9bb23623ab5978c8d82e7d3

SHA-256:
2253fd883e1ca92d28e876f376a1a918240e837b788647accac8a15d132a9768

Scanner detections:
26 / 68

Status:
Adware

Explanation:
This installer bundles various adware prorgams that may include toolbars and web browser advertising injectors/extensions.

Description:
This is an installer which may bundle legitimate applications with offers for additional 3rd-party applications that may be unwanted by the user. While the installer contains an 'opt-out' feature this is not set be defult and is usually overlooked.

Analysis date:
4/19/2024 8:58:28 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Application.Graftor.152464
866

Agnitum Outpost
PUA.Agent
7.1.1

AhnLab V3 Security
2014.09.15

Avira AntiVirus
Adware/iBryte.bxng
7.11.171.180

avast!
Win32:Rootkit-gen [Rtk]
2014.9-140922

AVG
Adware AdPlugin
2015.0.3344

Bitdefender
Gen:Variant.Application.Graftor.152464
1.0.20.1325

Comodo Security
Application.Win32.AgentCV.HWYE
19489

Dr.Web
Trojan.DownLoader11.32333
9.0.1.0265

Emsisoft Anti-Malware
Gen:Variant.Application.Graftor.152464
8.14.09.22.11

ESET NOD32
Win32/AdWare.iBryte.BI application
8.7.0.302.0

F-Prot
W32/A-34fffba4
v6.4.7.1.166

F-Secure
Gen:Variant.Application.Graftor
11.2014-22-09_2

G Data
Gen:Variant.Application.Graftor.152464
14.9.24

herdProtect (fuzzy)
2014.12.4.16

IKARUS anti.virus
AdWare.AdPlugin
t3scan.1.7.8.0

K7 AntiVirus
Unwanted-Program
13.183.13345

Kaspersky
not-a-virus:AdWare.Win32.iBryte
14.0.0.3213

Malwarebytes
PUP.Optional.OptimunInstaller
v2014.09.22.11

MicroWorld eScan
Gen:Variant.Application.Graftor.152464
15.0.0.795

NANO AntiVirus
Riskware.Win32.IBryte.desauy
0.28.2.61942

nProtect
Trojan-Clicker/W32.iBryte.82296.B
14.09.19.01

Reason Heuristics
PUP.Installer.ClickAccept.I
14.9.22.11

Sophos
iBryte Premium Installer
4.98

VIPRE Antivirus
Threat.4798837
32938

Zillya! Antivirus
Adware.iBryte.Win32.1812
2.0.0.1927

File size:
79.9 KB (81,784 bytes)

Product version:
2.4.8.1

Copyright:
Copyright (C) Premium Installer

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Adknowledge Fusion

Language:
English (United States)

Common path:
C:\users\{user}\downloads\fl_setup.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
3/23/2014 8:00:00 PM

Valid to:
3/24/2015 7:59:59 PM

Subject:
CN=Click Accept, O=Click Accept, STREET="4600 Madison Ave, 10th FL", L=Kansas City, S=Missouri, PostalCode=64112, C=US

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00A859045D8B63E183E2D539A00354DC59

File PE Metadata
Compilation timestamp:
9/14/2014 11:15:26 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
1536:UDWX5b2JlbOxZCI5sw2kxDIkONbmd9Q/rZQX:t5b2JNeZC9kxkkONQsS

Entry address:
0x9051

Entry point:
E8, 52, 05, 00, 00, E9, 36, FD, FF, FF, CC, FF, 25, A4, B1, 40, 00, FF, 25, A0, B1, 40, 00, 68, C1, 90, 40, 00, 64, FF, 35, 00, 00, 00, 00, 8B, 44, 24, 10, 89, 6C, 24, 10, 8D, 6C, 24, 10, 2B, E0, 53, 56, 57, A1, 1C, F0, 40, 00, 31, 45, FC, 33, C5, 50, 89, 65, E8, FF, 75, F8, 8B, 45, FC, C7, 45, FC, FE, FF, FF, FF, 89, 45, F8, 8D, 45, F0, 64, A3, 00, 00, 00, 00, C3, 8B, 4D, F0, 64, 89, 0D, 00, 00, 00, 00, 59, 5F, 5F, 5E, 5B, 8B, E5, 5D, 51, C3, 8B, FF, 55, 8B, EC, FF, 75, 14, FF, 75, 10, FF, 75, 0C, FF, 75...
 
[+]

Entropy:
6.1813

Code size:
38 KB (38,912 bytes)

The file fl_setup.exe has been seen being distributed by the following 2 URLs.

Remove fl_setup.exe - Powered by Reason Core Security