setup.exe

File Falcon

This adware bundler is distributed through Adknowledge's advertising supported software managers. The application setup.exe, “System Applet ” by File Falcon has been detected as adware by 33 anti-malware scanners. The program is a setup application that uses the Adknowledge Fusion installer. The file has been seen being downloaded from install.oinstaller5.com and multiple other hosts.
Publisher:
System Applet   (signed by File Falcon)

Product:
System Applet

Description:
System Applet

Version:
2.4.8.1

MD5:
6ab4402d0a34da40bac64dd1e2fd2187

SHA-1:
47fb1fe0d6667d842c81145f6d8946f98d3ae850

SHA-256:
3b448bfaec8009f1bc3126faaea5f91d8634461ea5add8bf6a4c477565c909f7

Scanner detections:
33 / 68

Status:
Adware

Explanation:
This installer bundles various adware prorgams that may include toolbars and web browser advertising injectors/extensions.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/26/2024 5:10:59 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.IBryte.U
911

Agnitum Outpost
PUA.iBryte
7.1.1

AhnLab V3 Security
2014.07.28

Avira AntiVirus
Adware/AgentCV.A.35275
7.11.164.56

avast!
Win32:IBryte-DY [PUP]
140617-1

AVG
Adware AdPlugin.VX
2014.0.3986

Bitdefender
Adware.IBryte.U
1.0.20.1095

Clam AntiVirus
Win.Adware.Ibryte-368
0.98/19086

Comodo Security
Application.Win32.AgentCV.HWYE
18997

Dr.Web
Adware.Downware.6099
9.0.1.05190

Emsisoft Anti-Malware
Adware.IBryte.U
8.14.08.07.04

ESET NOD32
Win32/AdWare.iBryte.AP
8.10162

Fortinet FortiGate
W32/Zbot.AAN!tr
8/7/2014

F-Prot
W32/DomaIQ.G2.gen
v6.4.7.1.166

F-Secure
Adware.IBryte.U
11.2014-07-08_5

G Data
Win32.Adware.IBryte
14.7.24

IKARUS anti.virus
PUA.PremiumInstaller
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.180.12498

Kaspersky
HEUR:Trojan.Win32.Generic
14.0.0.3494

Malwarebytes
v2014.07.28.03

McAfee
GenericATG-FGI!B722AC63A55B
5600.7045

MicroWorld eScan
Adware.IBryte.U
15.0.0.657

NANO AntiVirus
Trojan.Win32.Downware.dckzxf
0.28.2.60990

Norman
IBryte.PDB
11.20140807

nProtect
Adware.IBryte.U
14.07.03.01

Panda Antivirus
Trj/Genetic.gen
14.07.28.03

Qihoo 360 Security
Malware.QVM10.Gen
1.0.0.1015

Reason Heuristics
PUP.Installer.FileFalcon.F
14.8.7.16

Rising Antivirus
PE:Malware.Agent!6.17CF
23.00.65.14726

Vba32 AntiVirus
3.12.26.3

VIPRE Antivirus
Threat.4778314
31208

Zillya! Antivirus
Adware.iBryte.Win32.923
2.0.0.1835

File size:
315.9 KB (323,448 bytes)

Product version:
2.4.8.1

Copyright:
Copyright (C) 2013 System Applet

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Adknowledge Fusion

Language:
English (United States)

Common path:
C:\users\{user}\downloads\setup.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
3/20/2014 7:00:00 PM

Valid to:
3/21/2015 6:59:59 PM

Subject:
CN=File Falcon, O=File Falcon, STREET="4600 Madison Ave, 10th FL", L=Kansas City, S=Missouri, PostalCode=64112, C=US

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
02420FDABF9B310C1F48FF663337FFAB

File PE Metadata
Compilation timestamp:
7/18/2014 4:28:32 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
6144:/riNkJdFZiYiBZNENLrgo2SLhp+bTVU4al63opY7:/XL6NENLrtvh2gpY7

Entry address:
0x181F5

Entry point:
E8, C2, 8D, 00, 00, E9, 78, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, EC, 20, 8B, 45, 08, 56, 57, 6A, 08, 59, BE, 24, D4, 43, 00, 8D, 7D, E0, F3, A5, 89, 45, F8, 8B, 45, 0C, 5F, 89, 45, FC, 5E, 85, C0, 74, 0C, F6, 00, 08, 74, 07, C7, 45, F4, 00, 40, 99, 01, 8D, 45, F4, 50, FF, 75, F0, FF, 75, E4, FF, 75, E0, FF, 15, 84, D0, 43, 00, C9, C2, 08, 00, 8B, FF, 55, 8B, EC, 51, 53, 8B, 45, 0C, 83, C0, 0C, 89, 45, FC, 64, 8B, 1D, 00, 00, 00, 00, 8B, 03, 64, A3, 00, 00, 00, 00, 8B, 45, 08, 8B, 5D, 0C, 8B, 6D, FC, 8B, 63...
 
[+]

Entropy:
6.3850

Code size:
238 KB (243,712 bytes)

The file setup.exe has been seen being distributed by the following 2 URLs.

Remove setup.exe - Powered by Reason Core Security