player-chrome.exe

Build Input

This adware bundler is distributed through Adknowledge's advertising supported software managers. The application player-chrome.exe, “Fusion Install ” by Build Input has been detected as adware by 39 anti-malware scanners. The program is a setup application that uses the Adknowledge Fusion installer. This program installs potentially unwanted software on your PC at the same time as the software you are trying to install, without adequate consent. With this installer, users are expecting to download Google's Chrome web browser but before that occurs they may be presented with additional offers, mostly potentially unwanted software or adware.
Publisher:
Fusion Install   (signed by Build Input)

Product:
Fusion Install

Description:
Fusion Install

Version:
2.4.8.1

MD5:
6581efb197a831e3db436a6df92b716c

SHA-1:
75e95084b075facb12613a4bfb193d9b20c3a0b8

SHA-256:
454f17abd2e231b95a86c7cbfe8f0fd0bb9218a57b6c9e300d3f4281f62e00d3

Scanner detections:
39 / 68

Status:
Adware

Explanation:
This installer bundles various adware prorgams that may include toolbars and web browser advertising injectors/extensions.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
11/28/2024 4:56:53 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Bundler.Agent.B
849

Agnitum Outpost
PUA.Agent
7.1.1

AhnLab V3 Security
14.10.08

Avira AntiVirus
ADWARE/Adware.Gen7
7.11.147.26

avast!
Win32:Adware-gen [Adw]
141003-0

AVG
Adware AdPlugin.AAE
2014.0.4037

Baidu Antivirus
Trojan.Win32.Clikug
4.0.3.14108

Bitdefender
Application.Bundler.Agent.B
1.0.20.1405

Clam AntiVirus
Win.Adware.Agent-9033
0.98/19485

Comodo Security
Application.Win32.iBryte.WRP
18251

Dr.Web
Trojan.DownLoader11.31896
9.0.1.05190

Emsisoft Anti-Malware
Gen:Variant.Adware.Strictor.61512
14.10.08

ESET NOD32
Win32/AdWare.iBryte.BB application
7.0.302.0

Fortinet FortiGate
W32/Zbot.AAN!tr
10/8/2014

F-Prot
W32/A-c255719d
v6.4.7.1.166

F-Secure
Application.Bundler.Agent
11.2014-08-10_4

G Data
Win32.Adware.Ibryte
14.10.24

IKARUS anti.virus
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.177.12013

Kaspersky
not-a-virus:AdWare.Win32.iBryte
15.0.0.494

Malwarebytes
v2014.10.08.04

McAfee
Trojan.Artemis!2BDA97A3EE62
5600.6983

Microsoft Security Essentials
TrojanClicker:Win32/Clikug.A
1.10401

MicroWorld eScan
Application.Bundler.Agent.B
15.0.0.843

NANO AntiVirus
Trojan.Win32.Agent.cxjjsz
0.28.0.59608

Norman
IBryte.PDB
11.20141008

nProtect
Adware.IBryte.Y
14.08.13.01

Panda Antivirus
Trj/Genetic.gen
14.10.08.04

Qihoo 360 Security
Malware.QVM10.Gen
1.0.0.1015

Quick Heal
TrojanDownloader.Badur.A5
10.14.14.00

Reason Heuristics
PUP.Installer.BuildInput.N
14.10.8.16

Rising Antivirus
PE:Malware.iBryte!6.192B
23.00.65.141006

SUPERAntiSpyware
PUP.OptimumInstaller/Variant
10312

Trend Micro House Call
TROJ_CLIKUG.A
7.2.281

Trend Micro
TROJ_CLIKUG.A
10.465.08

Vba32 AntiVirus
3.12.26.0

VIPRE Antivirus
Threat.4778314
29418

Zillya! Antivirus
Adware.iBryte.Win32.854
2.0.0.1790

File size:
142.4 KB (145,784 bytes)

Product version:
2.4.8.1

Copyright:
Copyright (C) Fusion Install

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Adknowledge Fusion

Language:
English (United States)

Common path:
C:\users\{user}\downloads\player-chrome.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
3/24/2014 1:00:00 AM

Valid to:
3/25/2015 12:59:59 AM

Subject:
CN=Build Input, O=Build Input, STREET="4600 Madison Ave, 10th FL", L=Kansas City, S=Missouri, PostalCode=64112, C=US

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
0093C151407610A7B56F799C03CB8D955D

File PE Metadata
Compilation timestamp:
8/25/2014 5:00:26 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
1536:QoOxYf8IUZv/Cp/OUOFL8aXHXlZXLIvZ3oLLhjLmOiU6fEyPXXT0UVDSPLa5:QTYf8IUZv/otOFLX1ZbmZJLtVWK

Entry address:
0x53A7

Entry point:
E8, 3C, 05, 00, 00, E9, 36, FD, FF, FF, 8B, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A3, F8, A1, 40, 00, 89, 0D, F4, A1, 40, 00, 89, 15, F0, A1, 40, 00, 89, 1D, EC, A1, 40, 00, 89, 35, E8, A1, 40, 00, 89, 3D, E4, A1, 40, 00, 66, 8C, 15, 10, A2, 40, 00, 66, 8C, 0D, 04, A2, 40, 00, 66, 8C, 1D, E0, A1, 40, 00, 66, 8C, 05, DC, A1, 40, 00, 66, 8C, 25, D8, A1, 40, 00, 66, 8C, 2D, D4, A1, 40, 00, 9C, 8F, 05, 08, A2, 40, 00, 8B, 45, 00, A3, FC, A1, 40, 00, 8B, 45, 04, A3, 00, A2, 40, 00, 8D, 45, 08, A3, 0C, A2, 40...
 
[+]

Code size:
20.5 KB (20,992 bytes)

The file player-chrome.exe has been seen being distributed by the following URL.

Remove player-chrome.exe - Powered by Reason Core Security