player-chrome.exe

FUSION INSTALL

The Fusion Installer, which is a variant of Adknowledge's download manager bundles a number of ad-supported offerings in the installer. The application player-chrome.exe, “Fusion Install ” by FUSION INSTALL has been detected as adware by 40 anti-malware scanners. The program is a setup application that uses the Adknowledge Fusion installer. With this installer, users are expecting to download Google's Chrome web browser but before that occurs they may be presented with additional offers, mostly potentially unwanted software or adware.
Publisher:
Fusion Install   (signed by FUSION INSTALL)

Product:
Fusion Install

Description:
Fusion Install

Version:
2.4.8.1

MD5:
ea62faaf3df40f48de477a902b1d7632

SHA-1:
1e89b8f17f8d56efe8e1a60bb2f74a02f8dd0080

SHA-256:
aecaf7cccc497b483082aa160c5c5ddcaae23d2e5e2c87b00af4389a3bfdf257

Scanner detections:
40 / 68

Status:
Adware

Explanation:
This setup/installer bundles various adware components (toolbars, coupon extensions, ad-supported extensions and utility offers).

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/26/2024 11:35:59 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Graftor.128117
647

Agnitum Outpost
PUA.Agent
7.1.1

AhnLab V3 Security
Trojan/Win32.Buzus
2014.02.09

Avira AntiVirus
ADWARE/Adware.Gen7
7.11.137.120

avast!
PUP-gen [PUP]
2014.9-150428

AVG
Adware Skodna.Generic.ATO
2014.0.4311

Baidu Antivirus
Adware.Win32.iBryte
4.0.3.15428

Bitdefender
Gen:Variant.Adware.Graftor.128117
1.0.20.590

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Ibryte-271
0.98/21411

Comodo Security
Application.Win32.Adware.iBryte.BL
17695

Dr.Web
Trojan.Packed.28529
9.0.1.0118

Emsisoft Anti-Malware
Gen:Variant.Adware.Graftor.128117
8.15.04.28.04

Fortinet FortiGate
Adware/IBryte
4/28/2015

F-Prot
W32/DomaIQ.G.gen
v6.4.7.1.166

F-Secure
Application.Generic.593289
11.2015-28-04_3

G Data
Win32.Application.OptimumInstaller
15.4.24

herdProtect (fuzzy)
2015.7.28.19

IKARUS anti.virus
Win32.AdWare
t3scan.1.6.1.0

K7 AntiVirus
Adware
13.176.11684

Kaspersky
not-a-virus:AdWare.Win32.iBryte
14.0.0.2122

Malwarebytes
v2015.04.28.04

McAfee
Artemis!2DA27C0F7D24
5600.6781

MicroWorld eScan
Gen:Variant.Adware.Graftor.128117
16.0.0.354

NANO AntiVirus
Trojan.Win32.Buzus.crvmcc
0.28.0.57473

nProtect
Trojan-Clicker/W32.iBryte.2274088
14.04.07.01

Panda Antivirus
15.04.28.04

Qihoo 360 Security
Malware.QVM10.Gen
1.0.0.1015

Quick Heal
Adware.iBryte.DK4
4.15.14.00

Reason Heuristics
Threat.Adknowledge.Bundler
15.4.28.12

Rising Antivirus
PE:Malware.iBryte!6.14B5
23.00.65.15426

Sophos
PUA 'iBryte Optimum Installer'
5.13

Total Defense
Win32/Tnega.XGSDMHC
37.0.10841

Trend Micro House Call
TROJ_GEN.F47V0221
7.2.118

Trend Micro
TROJ_BUZUS_DD30051C.UVPA
10.465.28

Vba32 AntiVirus
suspected of Trojan.Downloader.gen.h
3.12.24.3

VIPRE Antivirus
Optimum Installer
25950

Zillya! Antivirus
Downloader.Agent.Win32.185015
2.0.0.1774

File size:
1.6 MB (1,673,000 bytes)

Product version:
2.4.8.1

Copyright:
Copyright (C) 2013 Fusion Install

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Adknowledge Fusion

Language:
English (United States)

Common path:
C:\users\{user}\downloads\player-chrome.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
10/3/2013 8:00:00 PM

Valid to:
9/20/2014 7:59:59 PM

Subject:
CN=FUSION INSTALL, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=FUSION INSTALL, L=Kansas City, S=Missouri, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
3615E290FD8B112928257EE3CD74B519

File PE Metadata
Compilation timestamp:
1/17/2014 9:32:27 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
49152:c/tiUYPtdFiMjJzSRG5soFEjHkyOCBGBdFTk:60UYPtd40gxBwk

Entry address:
0x36065

Entry point:
E8, 5E, 8C, 00, 00, E9, 78, FE, FF, FF, 6A, 0C, 68, D0, 4C, 47, 00, E8, C1, 35, 00, 00, 83, 65, E4, 00, 8B, 75, 08, 3B, 35, 98, 28, 59, 00, 77, 22, 6A, 04, E8, 61, 8E, 00, 00, 59, 83, 65, FC, 00, 56, E8, C3, 9B, 00, 00, 59, 89, 45, E4, C7, 45, FC, FE, FF, FF, FF, E8, 09, 00, 00, 00, 8B, 45, E4, E8, CD, 35, 00, 00, C3, 6A, 04, E8, 44, 8D, 00, 00, 59, C3, 8B, FF, 55, 8B, EC, 83, 3D, F4, 14, 59, 00, 00, 75, 18, E8, 99, 81, 00, 00, 6A, 1E, E8, C1, 7F, 00, 00, 68, FF, 00, 00, 00, E8, D7, 4C, 00, 00, 59, 59, A1...
 
[+]

Entropy:
7.1054

Code size:
391.5 KB (400,896 bytes)

The file player-chrome.exe has been seen being distributed by the following URL.

Remove player-chrome.exe - Powered by Reason Core Security