player-chrome.exe

Boot Compute

This adware bundler is distributed through Adknowledge's advertising supported software managers. The application player-chrome.exe, “Fusion Install ” by Boot Compute has been detected as adware by 40 anti-malware scanners. The program is a setup application that uses the Adknowledge Fusion installer. With this installer, users are expecting to download Google's Chrome web browser but before that occurs they may be presented with additional offers, mostly potentially unwanted software or adware.
Publisher:
Fusion Install   (signed by Boot Compute)

Product:
Fusion Install

Description:
Fusion Install

Version:
2.4.8.1

MD5:
defe00c58f3e66bca8c44c0115df7e4c

SHA-1:
5d7dad870bf0be8cb366291251021b0b554fc9ce

SHA-256:
c0c7ef24aa9b51d42ae41ae7809210bd6170c0c8e325f207dcb3117b2d64c0a6

Scanner detections:
40 / 68

Status:
Adware

Explanation:
This installer bundles various adware prorgams that may include toolbars and web browser advertising injectors/extensions.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
11/28/2024 5:41:22 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.GenericKD.1618449
389

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
2014.08.14

Avira AntiVirus
ADWARE/iBryte.Gen7
7.11.171.224

avast!
Win32:Adware-gen [Adw]
2014.9-160112

AVG
Adware AdPlugin
2017.0.2867

Baidu Antivirus
Trojan.Win32.Clikug
4.0.3.16112

Bitdefender
Trojan.GenericKD.1618449
1.0.20.60

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Ibryte-2688
0.98/19392

Comodo Security
Application.Win32.AgentCV.HWYE
19498

Dr.Web
Trojan.iBryte.499
9.0.1.012

Emsisoft Anti-Malware
Adware.IBryte.AF
8.16.01.12.06

ESET NOD32
Win32/AdWare.iBryte.BG application
10.7.0.302.0

Fortinet FortiGate
W32/Malware_fam.NB
1/12/2016

F-Prot
W32/A-c255719d
v6.4.7.1.166

F-Secure
Trojan.GenericKD.1618449
11.2016-12-01_3

G Data
Win32.Adware.Ibryte
16.1.24

IKARUS anti.virus
Trojan-Clicker.BFNI
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.183.13358

Kaspersky
not-a-virus:Downloader.Win32.Agent
14.0.0.829

Malwarebytes
PUP.Optional.Ibryte
v2016.01.12.06

McAfee
Artemis!0FF2B0F7AD04
5600.6523

Microsoft Security Essentials
TrojanClicker:Win32/Clikug.A
1.10401

MicroWorld eScan
Trojan.GenericKD.1618449
17.0.0.36

NANO AntiVirus
Riskware.Win32.IBryte.dfczab
0.28.2.61942

Norman
IBryte.PDB
11.20160112

nProtect
Trojan-Clicker/W32.iBryte.275832.C
14.09.17.01

Panda Antivirus
Trj/Genetic.gen
16.01.12.06

Qihoo 360 Security
Malware.QVM10.Gen
1.0.0.1015

Quick Heal
TrojanDownloader.Badur.A5
1.16.14.00

Reason Heuristics
PUP.Adknowledge.BootCompute.Bundler (M)
16.1.12.6

Rising Antivirus
PE:Malware.iBryte!6.192B
23.00.65.16110

Sophos
Mal/Inject-CEE
4.98

SUPERAntiSpyware
PUP.OptimumInstaller/Variant
9390

Trend Micro House Call
TROJ_CLIKUG.A
7.2.12

Trend Micro
TROJ_CLIKUG.A
10.465.12

Vba32 AntiVirus
3.12.26.0

VIPRE Antivirus
Threat.4778314
32938

Zillya! Antivirus
Adware.iBryte.Win32.1815
2.0.0.1926

File size:
250.4 KB (256,376 bytes)

Product version:
2.4.8.1

Copyright:
Copyright (C) 2013 Fusion Install

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Adknowledge Fusion

Language:
English (United States)

Common path:
C:\users\{user}\downloads\player-chrome.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
3/23/2014 9:00:00 PM

Valid to:
3/24/2015 8:59:59 PM

Subject:
CN=Boot Compute, O=Boot Compute, STREET="4600 Madison Ave, 10th FL", L=Kansas City, S=Missouri, PostalCode=64112, C=US

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
059AEF62ABD7F83178378663E98BDE5C

File PE Metadata
Compilation timestamp:
9/15/2014 6:30:20 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
3072:MM9eFXKWw6ZCSoYIVNRnjMXYzK6250OOxcYEPOM5n4raWB0:T/kZbPIVNRnjMynEPOM5nQau0

Entry address:
0x15EBB

Entry point:
E8, C2, 05, 00, 00, E9, D7, FC, FF, FF, CC, FF, 25, 58, 81, 41, 00, 68, 25, 5F, 41, 00, 64, FF, 35, 00, 00, 00, 00, 8B, 44, 24, 10, 89, 6C, 24, 10, 8D, 6C, 24, 10, 2B, E0, 53, 56, 57, A1, 1C, D0, 41, 00, 31, 45, FC, 33, C5, 50, 89, 65, E8, FF, 75, F8, 8B, 45, FC, C7, 45, FC, FE, FF, FF, FF, 89, 45, F8, 8D, 45, F0, 64, A3, 00, 00, 00, 00, C3, 8B, 4D, F0, 64, 89, 0D, 00, 00, 00, 00, 59, 5F, 5F, 5E, 5B, 8B, E5, 5D, 51, C3, 8B, FF, 55, 8B, EC, FF, 75, 14, FF, 75, 10, FF, 75, 0C, FF, 75, 08, 68, 66, 5A, 41, 00...
 
[+]

Code size:
90.5 KB (92,672 bytes)

The file player-chrome.exe has been seen being distributed by the following URL.

Remove player-chrome.exe - Powered by Reason Core Security