setup.exe

IMALI – N.I. MEDIA LTD

The application setup.exe by IMALI – N.I. MEDIA has been detected as adware by 27 anti-malware scanners. This is a setup and installation application and has been known to bundle potentially unwanted software. It is built using the Crossrider cross-browser extension platform. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider. The file has been seen being downloaded from www.freemediaplayer.tv.
Publisher:
IMALI – N.I. MEDIA LTD  (signed and verified)

MD5:
9ef1af2fe8e73e2a50c6ec28861e1652

SHA-1:
056df40d735fc25b8ca15aa342aa6ed1c9fa43a0

SHA-256:
83e6b4dbe52d83b7a47a40419d2f7eeb6d75b5a0557bbbc07b36e5334eafa020

Scanner detections:
27 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Analysis date:
5/10/2025 8:15:20 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Zusy.128984
5582423

Agnitum Outpost
Trojan.DL.Genome
7.1.1

AhnLab V3 Security
Adware/Win32.Imali
2015.05.30

Avira AntiVirus
TR/Dldr.Agent.272784
8.3.1.6

avast!
Win32:Evo-gen [Susp]
150525-2

AVG
Adware Generic6.SLA
2014.0.4311

Bitdefender
Gen:Variant.Zusy.128984
1.0.20.745

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Trojan.12708105
0.98/20522

Comodo Security
UnclassifiedMalware
22272

Dr.Web
Trojan.Crossrider1.31135
9.0.1.05190

Emsisoft Anti-Malware
Gen:Variant.Zusy.128984
15.05.29

ESET NOD32
Win32/Adware.Imali.A application
7.0.302.0

F-Secure
Gen:Variant.Zusy.128984
5.14.151

G Data
Gen:Variant.Zusy.128984
15.5.25

IKARUS anti.virus
PUA.Imali
t3scan.1.9.2.0

K7 AntiVirus
Adware
13.204.16076

McAfee
Trojan.Artemis!9EF1AF2FE8E7
18.0.204.0

MicroWorld eScan
Gen:Variant.Zusy.128984
16.0.0.447

NANO AntiVirus
Trojan.Win32.Genome.dorkfu
0.30.24.1636

Norman
Gen:Variant.Zusy.128984
03.12.2014 13:20:04

Panda Antivirus
Trj/Genetic.gen
15.05.29.11

Qihoo 360 Security
Win32/Trojan.b07
1.0.0.1015

Reason Heuristics
PUP.IMALI.Installer
15.5.29.22

Trend Micro House Call
TROJ_GEN.R0C1C0OCO15
7.2.149

Trend Micro
TROJ_GEN.R0C1C0OCO15
10.465.29

VIPRE Antivirus
Threat.4150696
40552

File size:
266.4 KB (272,784 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\setup.exe

Digital Signature
Authority:
GlobalSign nv-sa

Valid from:
12/29/2014 12:24:00 PM

Valid to:
12/30/2015 12:24:00 PM

Subject:
E=contact@imalimedia.net, CN=IMALI – N.I. MEDIA LTD, O=IMALI – N.I. MEDIA LTD, L=Ramat Gan, C=IL

Issuer:
CN=GlobalSign CodeSigning CA - SHA256 - G2, O=GlobalSign nv-sa, C=BE

Serial number:
11215FB4642CA96492ED635B137D682A42C4

File PE Metadata
Compilation timestamp:
1/21/2015 7:59:47 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
6144:1sZUTSIZT+h3u7JRcCTWBriTBxowtGPfw:OOSIN+2fTWBr2o8GPfw

Entry address:
0x16611

Entry point:
E8, DA, 6B, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, EC, 20, 8B, 45, 08, 56, 57, 6A, 08, 59, BE, 1C, 95, 42, 00, 8D, 7D, E0, F3, A5, 89, 45, F8, 8B, 45, 0C, 5F, 89, 45, FC, 5E, 85, C0, 74, 0C, F6, 00, 08, 74, 07, C7, 45, F4, 00, 40, 99, 01, 8D, 45, F4, 50, FF, 75, F0, FF, 75, E4, FF, 75, E0, FF, 15, CC, 90, 42, 00, C9, C2, 08, 00, CC, CC, CC, CC, CC, CC, CC, CC, CC, 55, 8B, EC, 57, 56, 8B, 75, 0C, 8B, 4D, 10, 8B, 7D, 08, 8B, C1, 8B, D1, 03, C6, 3B, FE, 76, 08, 3B, F8, 0F, 82, A0, 01, 00, 00, 81...
 
[+]

Code size:
159.5 KB (163,328 bytes)

The file setup.exe has been seen being distributed by the following URL.

Remove setup.exe - Powered by Reason Core Security