setup.exe

WARP INSTALL

The software uses the Optimum Installer/Fusion Installer (Adknowledge) to download and install an offer stack of adware including toolbars, coupon extensions and various unwanted utilities. This installer is just a stub to present offers and download the expected software. The application setup.exe, “Fusion Install ” by WARP INSTALL has been detected as adware by 36 anti-malware scanners. The program is a setup application that uses the Adknowledge Fusion installer. This program installs potentially unwanted software on your PC at the same time as the software you are trying to install, without adequate consent.
Publisher:
Fusion Install   (signed by WARP INSTALL)

Product:
Fusion Install

Description:
Fusion Install

Version:
2.4.8.1

MD5:
2d2f24ef095641d59eac02348690acc1

SHA-1:
c19702d7918d50ef79e80275496dbc785a3d92be

SHA-256:
e2dd14ed5d07cf7f1d7968237517c278a42a91922f8ef1eb33d4d5673ebbfb38

Scanner detections:
36 / 68

Status:
Adware

Explanation:
This setup/installer bundles various adware components (toolbars, shopping extensions, utility offers).

Description:
This is an installer which may bundle legitimate applications with offers for additional 3rd-party applications that may be unwanted by the user. While the installer contains an 'opt-out' feature this is not set be defult and is usually overlooked.

Analysis date:
4/19/2024 12:36:21 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Bundler.Agent.B
391

Agnitum Outpost
PUA.Downloader
7.1.1

AhnLab V3 Security
16.01.10

Avira AntiVirus
Adware/iBryte.qoemno
7.11.138.176

avast!
Win32:Somoto-N [PUP]
2014.9-160110

AVG
Adware AdPlugin
2017.0.2869

Baidu Antivirus
Adware.Win32.iBryte
4.0.3.16110

Bitdefender
Application.Bundler.Agent.B
1.0.20.50

Clam AntiVirus
Win.Trojan.Agent-736274
0.98/19086

Comodo Security
TrojWare.Win32.IBryte.S
17984

Dr.Web
Trojan.Packed.26508
9.0.1.010

Emsisoft Anti-Malware
Gen:Variant.Adware.Graftor.144330
8.16.01.10.11

ESET NOD32
Win32/AdWare.iBryte.AA application
10.7.0.302.0

F-Prot
W32/DomaIQ.G.gen
v6.4.7.1.166

F-Secure
Application.Bundler.Agent
11.2016-10-01_1

G Data
Win32.Application.PremiumInstaller
16.1.24

IKARUS anti.virus
not-a-virus:Downloader.Win32.Agent
t3scan.2.2.29

K7 AntiVirus
Unwanted-Program
13.176.11663

Kaspersky
not-a-virus:Downloader.Win32.Agent
14.0.0.838

Malwarebytes
v2016.01.10.11

McAfee
GenericATG-FGI!3B0404F8E1DE
5600.6525

MicroWorld eScan
Application.Bundler.Agent.B
17.0.0.30

NANO AntiVirus
Trojan.Win32.Downware.cvgamb
0.28.0.58491

Norman
Downloader
11.20160110

nProtect
Trojan/W32.Badur.241952
14.06.27.01

Panda Antivirus
Trj/Genetic.gen
16.01.10.11

Qihoo 360 Security
Malware.QVM10.Gen
1.0.0.1015

Quick Heal
Adware.iBryte.DK4
1.16.14.00

Reason Heuristics
PUP.Adknowledge.WARPINSTALL.Installer (M)
16.1.10.11

Rising Antivirus
PE:Malware.iBryte!6.14B5
23.00.65.16108

Total Defense
Win32/Tnega.XABfAXD
37.0.10836

Vba32 AntiVirus
suspected of Trojan.Downloader.gen.h
3.12.24.3

VIPRE Antivirus
Trojan.Win32.Generic
27698

Zillya! Antivirus
Downloader.Agent.Win32.185140
2.0.0.1773

File size:
215.3 KB (220,448 bytes)

Product version:
2.4.8.1

Copyright:
Copyright (C) 2013 Fusion Install

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Adknowledge Fusion

Language:
English (United States)

Common path:
C:\users\{user}\downloads\setup.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
10/3/2013 6:00:00 PM

Valid to:
9/20/2014 5:59:59 PM

Subject:
CN=WARP INSTALL, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=WARP INSTALL, L=Kansas City, S=Missouri, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
52A35E3AC3B67E8CD7BB42D490658BBA

File PE Metadata
Compilation timestamp:
3/14/2014 12:31:48 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
3072:YZ97gngEqZ0L1F+JiZzarjiqJzIVSyYOLoRa7IblfU5alpiG:wMnw0L1FLxNoyYOsRF3lpiG

Entry address:
0xCEDB

Entry point:
E8, 0C, 48, 00, 00, E9, 78, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, EC, 20, 8B, 45, 08, 56, 57, 6A, 08, 59, BE, A4, 72, 42, 00, 8D, 7D, E0, F3, A5, 89, 45, F8, 8B, 45, 0C, 5F, 89, 45, FC, 5E, 85, C0, 74, 0C, F6, 00, 08, 74, 07, C7, 45, F4, 00, 40, 99, 01, 8D, 45, F4, 50, FF, 75, F0, FF, 75, E4, FF, 75, E0, FF, 15, 5C, 70, 42, 00, C9, C2, 08, 00, 8B, FF, 55, 8B, EC, 51, 53, 8B, 45, 0C, 83, C0, 0C, 89, 45, FC, 64, 8B, 1D, 00, 00, 00, 00, 8B, 03, 64, A3, 00, 00, 00, 00, 8B, 45, 08, 8B, 5D, 0C, 8B, 6D, FC, 8B, 63...
 
[+]

Entropy:
6.4067

Code size:
151 KB (154,624 bytes)

The file setup.exe has been seen being distributed by the following URL.

Remove setup.exe - Powered by Reason Core Security