setup.exe

WARP INSTALL

The software uses the Optimum Installer/Fusion Installer (Adknowledge) to download and install an offer stack of adware including toolbars, coupon extensions and various unwanted utilities. This installer is just a stub to present offers and download the expected software. The application setup.exe, “Fusion Install ” by WARP INSTALL has been detected as adware by 36 anti-malware scanners. The program is a setup application that uses the Adknowledge Fusion installer. This program installs potentially unwanted software on your PC at the same time as the software you are trying to install, without adequate consent.
Publisher:
Fusion Install   (signed by WARP INSTALL)

Product:
Fusion Install

Description:
Fusion Install

Version:
2.4.8.1

MD5:
612b43b6121c43dc00b4db0a4655c482

SHA-1:
0f091377a6c61247a8279441e6f1d3b2e14ff6a4

Scanner detections:
36 / 68

Status:
Adware

Explanation:
This setup/installer bundles various adware components (toolbars, shopping extensions, utility offers).

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
4/25/2024 9:57:07 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Bundler.Agent.B
410

Agnitum Outpost
PUA.Downloader
7.1.1

AhnLab V3 Security
15.12.22

Avira AntiVirus
Adware/iBryte.qoemno
7.11.138.176

avast!
Win32:Somoto-N [PUP]
2014.9-151222

AVG
Adware AdPlugin
2016.0.2888

Baidu Antivirus
Adware.Win32.iBryte
4.0.3.151222

Bitdefender
Application.Bundler.Agent.B
1.0.20.1780

Clam AntiVirus
Win.Trojan.Agent-736274
0.98/19086

Comodo Security
TrojWare.Win32.IBryte.S
17984

Dr.Web
Trojan.Packed.26508
9.0.1.0356

Emsisoft Anti-Malware
Gen:Variant.Adware.Graftor.144330
8.15.12.22.06

ESET NOD32
Win32/AdWare.iBryte.AA application
9.7.0.302.0

F-Prot
W32/DomaIQ.G.gen
v6.4.7.1.166

F-Secure
Application.Bundler.Agent
11.2015-22-12_3

G Data
Win32.Application.PremiumInstaller
15.12.24

IKARUS anti.virus
not-a-virus:Downloader.Win32.Agent
t3scan.2.2.29

K7 AntiVirus
Unwanted-Program
13.176.11663

Kaspersky
not-a-virus:Downloader.Win32.Agent
14.0.0.934

Malwarebytes
v2015.12.22.06

McAfee
GenericATG-FGI!3B0404F8E1DE
5600.6544

MicroWorld eScan
Application.Bundler.Agent.B
16.0.0.1068

NANO AntiVirus
Trojan.Win32.Downware.cvgamb
0.28.0.58491

Norman
Downloader
11.20151222

nProtect
Trojan/W32.Badur.241952
14.06.27.01

Panda Antivirus
Trj/Genetic.gen
15.12.22.06

Qihoo 360 Security
Malware.QVM10.Gen
1.0.0.1015

Quick Heal
Adware.iBryte.DK4
12.15.14.00

Reason Heuristics
PUP.Adknowledge.WARPINSTALL.Installer (M)
15.12.22.6

Rising Antivirus
PE:Malware.iBryte!6.14B5
23.00.65.151220

Total Defense
Win32/Tnega.XABfAXD
37.0.10836

Vba32 AntiVirus
suspected of Trojan.Downloader.gen.h
3.12.24.3

VIPRE Antivirus
Trojan.Win32.Generic
27698

Zillya! Antivirus
Downloader.Agent.Win32.185140
2.0.0.1773

File size:
244.3 KB (250,144 bytes)

Product version:
2.4.8.1

Copyright:
Copyright (C) 2013 Fusion Install

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Adknowledge Fusion

Language:
English (United States)

Common path:
C:\Documents and Settings\{user}\My documents\downloads\setup.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
10/3/2013 8:00:00 PM

Valid to:
9/20/2014 7:59:59 PM

Subject:
CN=WARP INSTALL, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=WARP INSTALL, L=Kansas City, S=Missouri, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
52A35E3AC3B67E8CD7BB42D490658BBA

File PE Metadata
Compilation timestamp:
5/15/2014 5:00:12 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
3072:zalmA4z+Kh6sjqKm2fYQtI/hSuwYbRKi1+18iJiVPSxNUSfcL+p25Nxpjm:um5z+Kh6sjDm2fYG7Wfs18L4EL+sxpjm

Entry address:
0x102A7

Entry point:
E8, 50, 65, 00, 00, E9, 78, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, EC, 20, 8B, 45, 08, 56, 57, 6A, 08, 59, BE, 80, E2, 42, 00, 8D, 7D, E0, F3, A5, 89, 45, F8, 8B, 45, 0C, 5F, 89, 45, FC, 5E, 85, C0, 74, 0C, F6, 00, 08, 74, 07, C7, 45, F4, 00, 40, 99, 01, 8D, 45, F4, 50, FF, 75, F0, FF, 75, E4, FF, 75, E0, FF, 15, 38, E0, 42, 00, C9, C2, 08, 00, 8B, FF, 55, 8B, EC, 51, 53, 8B, 45, 0C, 83, C0, 0C, 89, 45, FC, 64, 8B, 1D, 00, 00, 00, 00, 8B, 03, 64, A3, 00, 00, 00, 00, 8B, 45, 08, 8B, 5D, 0C, 8B, 6D, FC, 8B, 63...
 
[+]

Entropy:
6.3827

Code size:
178 KB (182,272 bytes)

The file setup.exe has been seen being distributed by the following URL.

Remove setup.exe - Powered by Reason Core Security