setup.exe

File Monarch

This adware bundler is distributed through Adknowledge's advertising supported software managers. The application setup.exe, “Fusion Install ” by File Monarch has been detected as adware by 41 anti-malware scanners. The program is a setup application that uses the Adknowledge Fusion installer. The file has been seen being downloaded from www.download111bucket.com.
Publisher:
Fusion Install   (signed by File Monarch)

Product:
Fusion Install

Description:
Fusion Install

Version:
2.4.8.1

MD5:
f82e56311c3a0855aee76a76c9d95592

SHA-1:
0ed8d24a2e00f2854bed067cac8193f953896f78

SHA-256:
9a1c72a6c6786c343bfed2b22f06d4f55785af2ee2c94ff9e5838d863b74d3b3

Scanner detections:
41 / 68

Status:
Adware

Explanation:
This installer bundles various adware prorgams that may include toolbars and web browser advertising injectors/extensions.

Description:
This is an installer which may bundle legitimate applications with offers for additional 3rd-party applications that may be unwanted by the user. While the installer contains an 'opt-out' feature this is not set be defult and is usually overlooked.

Analysis date:
11/15/2024 1:01:09 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Kazy.466534
373

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
2014.08.14

Avira AntiVirus
TR/Kazy.439479.2
7.11.169.156

avast!
Win32:PUP-gen [PUP]
2014.9-160128

AVG
Adware AdPlugin
2017.0.2851

Baidu Antivirus
Trojan.Win32.Clikug
4.0.3.16128

Bitdefender
Gen:Variant.Kazy.439479
1.0.20.140

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Ibryte-592
0.98/19086

Comodo Security
Application.Win32.AgentCV.HWYE
19325

Dr.Web
Trojan.DownLoader11.30512
9.0.1.028

Emsisoft Anti-Malware
Gen:Variant.Adware.Kazy.466534
8.16.01.28.09

ESET NOD32
Win32/AdWare.iBryte.BG application
10.7.0.302.0

Fortinet FortiGate
W32/Malware_fam.NB
1/28/2016

F-Prot
W32/A-c255719d
v6.4.7.1.166

F-Secure
Gen:Variant.Adware.Kazy
11.2016-28-01_5

G Data
Gen:Variant.Kazy.439479
16.1.24

IKARUS anti.virus
Trojan-Clicker.BFNI
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.184.13718

Kaspersky
not-a-virus:Downloader.Win32.Agent
14.0.0.748

Malwarebytes
PUP.Optional.iBryte
v2016.01.28.09

McAfee
Artemis!0FF2B0F7AD04
5600.6507

Microsoft Security Essentials
TrojanClicker:Win32/Clikug.A
1.10401

MicroWorld eScan
Gen:Variant.Kazy.466534
17.0.0.84

NANO AntiVirus
Trojan.Win32.Inject.dengxv
0.28.2.62671

Norman
Gen:Variant.Kazy.466534
11.20160128

nProtect
Trojan-Clicker/W32.iBryte.271736.B
14.10.17.01

Panda Antivirus
Trj/Genetic.gen
16.01.28.09

Qihoo 360 Security
Win32/Trojan.Dropper.c9f
1.0.0.1015

Quick Heal
TrojanDownloader.Badur.A5
1.16.14.00

Reason Heuristics
PUP.Adknowledge.FileMonarch.Bundler (M)
16.1.28.9

Rising Antivirus
PE:Malware.iBryte!6.192B
23.00.65.16126

Sophos
Virus 'Mal/Inject-CEE'
5.12

SUPERAntiSpyware
PUP.OptimumInstaller/Variant
9358

Total Defense
Win32/Tnega.IQAFGOD
37.0.11237

Trend Micro House Call
TROJ_CLIKUG.A
7.2.28

Trend Micro
TROJ_CLIKUG.A
10.465.28

Vba32 AntiVirus
3.12.26.0

VIPRE Antivirus
Threat.4150696
33706

Zillya! Antivirus
Adware.iBryte.Win32.854
2.0.0.1790

File size:
267.9 KB (274,296 bytes)

Product version:
2.4.8.1

Copyright:
Copyright (C) 2013 Fusion Install

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Adknowledge Fusion

Language:
English (United States)

Common path:
C:\users\{user}\downloads\setup.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
3/17/2014 8:00:00 PM

Valid to:
3/18/2015 7:59:59 PM

Subject:
CN=File Monarch, O=File Monarch, STREET="4600 Madison Ave., FL 10", L=Kansas City, S=Missouri, PostalCode=64112, C=US

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00E65C750985B066CBB7B485ACF86E58B1

File PE Metadata
Compilation timestamp:
9/6/2014 9:00:10 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
6144:4BLl2ONF2nOMKmEDke4HJViL/z37Fj7N1B39wGsll7:qLgONcGTDkbJqL3J7HgGsP7

Entry address:
0x1691F

Entry point:
E8, BE, 05, 00, 00, E9, D7, FC, FF, FF, CC, FF, 25, 54, 91, 41, 00, 68, 89, 69, 41, 00, 64, FF, 35, 00, 00, 00, 00, 8B, 44, 24, 10, 89, 6C, 24, 10, 8D, 6C, 24, 10, 2B, E0, 53, 56, 57, A1, 1C, E0, 41, 00, 31, 45, FC, 33, C5, 50, 89, 65, E8, FF, 75, F8, 8B, 45, FC, C7, 45, FC, FE, FF, FF, FF, 89, 45, F8, 8D, 45, F0, 64, A3, 00, 00, 00, 00, C3, 8B, 4D, F0, 64, 89, 0D, 00, 00, 00, 00, 59, 5F, 5F, 5E, 5B, 8B, E5, 5D, 51, C3, 8B, FF, 55, 8B, EC, FF, 75, 14, FF, 75, 10, FF, 75, 0C, FF, 75, 08, 68, CA, 64, 41, 00...
 
[+]

Entropy:
7.1363

Code size:
93 KB (95,232 bytes)

The file setup.exe has been seen being distributed by the following URL.

Remove setup.exe - Powered by Reason Core Security