setup.exe

WARP INSTALLER

The software uses a vraiant of the Adknowledge Optimum Installer to bundle additional offers in the setup routine including adware toolbars and extensions. This installer itself is just a download manager designed to present such offers (with minimal notice). The application setup.exe, “Premium Installer ” by WARP INSTALLER has been detected as adware by 37 anti-malware scanners. The program is a setup application that uses the Adknowledge Fusion installer. This program installs potentially unwanted software on your PC at the same time as the software you are trying to install, without adequate consent.
Publisher:
Premium Installer   (signed by WARP INSTALLER)

Product:
Premium Installer

Description:
Premium Installer

Version:
2.4.8.1

MD5:
49c230556e72081ae8299138266b2b0c

SHA-1:
aceb72e0bbd897bad6687332c7d5702eff472f7d

SHA-256:
1c65c6c7138fa7745f9da825b431be92d93fb12356ea218487ac81314892f02a

Scanner detections:
37 / 68

Status:
Adware

Explanation:
This installer bundles various adware prorgams that may include toolbars and web browser advertising injectors/extensions.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
4/29/2024 12:43:18 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Bundler.Agent.B
397

Agnitum Outpost
PUA.Agent
7.1.1

AhnLab V3 Security
16.01.04

Avira AntiVirus
ADWARE/Adware.Gen7
7.11.146.224

avast!
Win32:IBryte-CY [PUP]
2014.9-160104

AVG
Adware AdPlugin
2017.0.2875

Bitdefender
Application.Bundler.Agent.B
1.0.20.20

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Trojan.Agent-724568
0.98/20552

Comodo Security
Application.Win32.iBryte.WRP
18256

Dr.Web
Trojan.Packed.26508
9.0.1.04

Emsisoft Anti-Malware
8.16.01.04.10

ESET NOD32
Win32/AdWare.iBryte.AA application
10.7.0.302.0

Fortinet FortiGate
Riskware/Generic.AC.1188117
1/4/2016

F-Prot
W32/DomaIQ.G2.gen
v6.4.7.1.166

F-Secure
Application.Bundler.Agent
11.2016-04-01_2

G Data
Win32.Adware.Ibryte
16.1.24

IKARUS anti.virus
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.177.12013

Kaspersky
Trojan.Win32.Badur
14.0.0.868

Malwarebytes
v2016.01.04.10

McAfee
GenericATG-FGI!59C4BEBE48BC
5600.6531

MicroWorld eScan
Application.Bundler.Agent.B
17.0.0.12

NANO AntiVirus
Trojan.Win32.Badur.cxnrwx
0.28.0.59911

nProtect
Trojan-Clicker/W32.iBryte.250664
14.07.29.01

Panda Antivirus
Trj/Genetic.gen
16.01.04.10

Qihoo 360 Security
Malware.QVM10.Gen
1.0.0.1015

Quick Heal
Adware.iBryte.DK4
1.16.14.00

Reason Heuristics
PUP.Adknowledge.WARPINSTALLER.Installer (M)
16.1.4.10

Rising Antivirus
PE:Malware.Agent!6.175E
23.00.65.16102

SUPERAntiSpyware
PUP.OptimumInstaller/Variant
9406

Total Defense
Win32/iBryte.MFENCPD
37.1.62.1

Vba32 AntiVirus
3.12.26.0

VIPRE Antivirus
Trojan.Win32.Generic
28770

Zillya! Antivirus
Adware.iBryte.Win32.864
2.0.0.1790

File size:
226.8 KB (232,232 bytes)

Product version:
2.4.8.1

Copyright:
Copyright (C) 2013 Premium Installer

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Adknowledge Fusion

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\microsoft\windows\temporary internet files\content.ie5\{random}\setup.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
10/3/2013 5:00:00 PM

Valid to:
9/20/2014 4:59:59 PM

Subject:
CN=WARP INSTALLER, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=WARP INSTALLER, L=Kansas City, S=Missouri, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
2073183E3CAF3D7A109497C973C378FF

File PE Metadata
Compilation timestamp:
6/26/2014 2:00:13 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
3072:u8sv4wcKG5wZBaV+i8tPduh5tTfYr/HMylM1Ye6dJincTTjZKOrVR3apEV:Mv4wcKDHTIhHfoUwhTjQmDapEV

Entry address:
0x10A57

Entry point:
E8, 40, 36, 00, 00, E9, 78, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, EC, 20, 8B, 45, 08, 56, 57, 6A, 08, 59, BE, 48, 92, 42, 00, 8D, 7D, E0, F3, A5, 89, 45, F8, 8B, 45, 0C, 5F, 89, 45, FC, 5E, 85, C0, 74, 0C, F6, 00, 08, 74, 07, C7, 45, F4, 00, 40, 99, 01, 8D, 45, F4, 50, FF, 75, F0, FF, 75, E4, FF, 75, E0, FF, 15, 30, 90, 42, 00, C9, C2, 08, 00, 8B, FF, 55, 8B, EC, 51, 53, 8B, 45, 0C, 83, C0, 0C, 89, 45, FC, 64, 8B, 1D, 00, 00, 00, 00, 8B, 03, 64, A3, 00, 00, 00, 00, 8B, 45, 08, 8B, 5D, 0C, 8B, 6D, FC, 8B, 63...
 
[+]

Entropy:
6.3374

Code size:
159.5 KB (163,328 bytes)

The file setup.exe has been seen being distributed by the following URL.

Remove setup.exe - Powered by Reason Core Security