setup.exe

FUSION INSTALL

The Fusion Installer, which is a variant of Adknowledge's download manager bundles a number of ad-supported offerings in the installer. The application setup.exe, “Fusion Install ” by FUSION INSTALL has been detected as adware by 38 anti-malware scanners. The program is a setup application that uses the Adknowledge Fusion installer. It is also typically executed from an Internet Explorer cache folder. The file has been seen being downloaded from secure.1-fusioninstall.com.
Publisher:
Fusion Install   (signed by FUSION INSTALL)

Product:
Fusion Install

Description:
Fusion Install

Version:
2.4.8.1

MD5:
5c1f93432e5125ab49fbc35da5f0ad48

SHA-1:
e7026121fb1f8e351c6e440c86448c9d2d1b4f1f

SHA-256:
2ef8d1daab1482c3b0d79b2686733634da54ef08d183c1ba2b0a2cd658fedc3e

Scanner detections:
38 / 68

Status:
Adware

Explanation:
This setup/installer bundles various adware components (toolbars, coupon extensions, ad-supported extensions and utility offers).

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
4/26/2024 8:07:38 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Generic.593289
375

Agnitum Outpost
PUA.Agent
7.1.1

AhnLab V3 Security
Trojan/Win32.Buzus
2014.02.09

Avira AntiVirus
Adware/iBryte.M
7.11.130.82

avast!
Malware-gen
2014.9-160126

AVG
Adware Generic5
2017.0.2853

Baidu Antivirus
Adware.Win32.iBryte
4.0.3.16126

Bitdefender
Application.Generic.593289
1.0.20.130

Clam AntiVirus
Win.Adware.Agent-6916
0.98/19168

Comodo Security
Application.Win32.iBryte.R
17759

Dr.Web
Trojan.Packed.25441
9.0.1.026

Emsisoft Anti-Malware
Gen:Variant.Symmi.38436
8.16.01.26.01

ESET NOD32
Win32/AdWare.iBryte (variant)
10.9400

Fortinet FortiGate
Riskware/IBryte
1/26/2016

F-Prot
W32/Backdoor2.HTKO
v6.4.7.1.166

F-Secure
Application.Generic.593289
11.2016-26-01_3

G Data
Win32.Application.OptimumInstaller
16.1.24

IKARUS anti.virus
Win32.AdWare
t3scan.2.2.29

K7 AntiVirus
Adware
13.176.11595

Kaspersky
HEUR:Trojan.Win32.Generic
14.0.0.760

Malwarebytes
v2016.01.26.01

McAfee
Artemis!5032EA165D47
5600.6509

MicroWorld eScan
Application.Generic.593289
17.0.0.78

NANO AntiVirus
Trojan.Win32.Buzus.ctabuf
0.28.0.57630

nProtect
Trojan-Clicker/W32.iBryte.555816
14.05.09.01

Panda Antivirus
16.01.26.01

Qihoo 360 Security
HEUR/Malware.QVM10.Gen
1.0.0.1015

Quick Heal
Adware.iBryte.DK4
1.16.14.00

Reason Heuristics
PUP.Adknowledge.FUSIONINSTALL.Installer (M)
16.1.26.1

Rising Antivirus
PE:PUF.PremiumInstaller!1.9F73
23.00.65.16124

Total Defense
Win32/Tnega.SRDMYD
37.0.10849

Trend Micro House Call
TROJ_GEN.F47V0127
7.2.26

Trend Micro
TROJ_BUZUS_DD30051C.UVPA
10.465.26

Vba32 AntiVirus
SScope.Malware-Cryptor.iBryte
3.12.24.3

VIPRE Antivirus
Optimum Installer
26304

Zillya! Antivirus
Trojan.Buzus.Win32.120232
2.0.0.1771

File size:
220.8 KB (226,088 bytes)

Product version:
2.4.8.1

Copyright:
Copyright (C) 2013 Fusion Install

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Adknowledge Fusion

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\microsoft\windows\temporary internet files\content.ie5\{random}\setup.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
10/4/2013 1:00:00 AM

Valid to:
9/21/2014 12:59:59 AM

Subject:
CN=FUSION INSTALL, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=FUSION INSTALL, L=Kansas City, S=Missouri, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
3615E290FD8B112928257EE3CD74B519

File PE Metadata
Compilation timestamp:
2/28/2014 2:16:56 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
3072:E+2w4XQ2UoxPCEJigzolzisJT813EaOQat2792INOq5a6prk:74XQ2PPv3bFEaOztV56prk

Entry address:
0xE43B

Entry point:
E8, 0C, 48, 00, 00, E9, 78, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, EC, 20, 8B, 45, 08, 56, 57, 6A, 08, 59, BE, A4, 92, 42, 00, 8D, 7D, E0, F3, A5, 89, 45, F8, 8B, 45, 0C, 5F, 89, 45, FC, 5E, 85, C0, 74, 0C, F6, 00, 08, 74, 07, C7, 45, F4, 00, 40, 99, 01, 8D, 45, F4, 50, FF, 75, F0, FF, 75, E4, FF, 75, E0, FF, 15, 5C, 90, 42, 00, C9, C2, 08, 00, 8B, FF, 55, 8B, EC, 51, 53, 8B, 45, 0C, 83, C0, 0C, 89, 45, FC, 64, 8B, 1D, 00, 00, 00, 00, 8B, 03, 64, A3, 00, 00, 00, 00, 8B, 45, 08, 8B, 5D, 0C, 8B, 6D, FC, 8B, 63...
 
[+]

Entropy:
6.3843

Code size:
156.5 KB (160,256 bytes)

The file setup.exe has been seen being distributed by the following URL.

Remove setup.exe - Powered by Reason Core Security