setup.exe

Boot Compute

This is published and distributed via an Adknowledge's advertising supported (adware) software installer. The application setup.exe, “Fusion Install ” by Boot Compute has been detected as adware by 40 anti-malware scanners. The program is a setup application that uses the Adknowledge Fusion installer. The file has been seen being downloaded from download1157endpoint.com.
Publisher:
Fusion Install   (signed by Boot Compute)

Product:
Fusion Install

Description:
Fusion Install

Version:
2.4.8.1

MD5:
ba6b88b64d2240683edfc50189c237f2

SHA-1:
1c7628161924cfeb48654f09f8690432abbdd3e7

SHA-256:
e85ae17e06a1bd13bd6a18497fb67536b66303513063cd5dda5cc9f716e4748f

Scanner detections:
40 / 68

Status:
Adware

Explanation:
This installer bundles various adware prorgams that may include toolbars and web browser advertising injectors/extensions.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
11/28/2024 5:45:10 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Application.Kazy.427497
386

Agnitum Outpost
Trojan.Agent
7.1.1

AhnLab V3 Security
PUP/Win32.DomaIQ
2014.08.16

Avira AntiVirus
Adware/iBryte.bxmz
7.11.166.250

avast!
Win32:IBryte-EF [PUP]
2014.9-160115

AVG
Adware AdPlugin
2017.0.2864

Baidu Antivirus
Adware.Win32.iBryte
4.0.3.16115

Bitdefender
Gen:Variant.Application.Kazy.427497
1.0.20.75

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Ibryte-2688
0.98/19454

Comodo Security
Application.Win32.AgentCV.HWYE
19178

Dr.Web
Trojan.DownLoader11.27741
9.0.1.015

Emsisoft Anti-Malware
Adware.IBryte.AF
8.16.01.15.09

ESET NOD32
Win32/AdWare.iBryte.BG application
10.7.0.302.0

Fortinet FortiGate
W32/Malware_fam.NB
1/15/2016

F-Prot
W32/A-f45b4d3a
v6.4.7.1.166

F-Secure
Gen:Variant.Application.Kazy
11.2016-15-01_6

G Data
Gen:Variant.Application.Kazy.427497
16.1.24

IKARUS anti.virus
AdWare.AdPlugin
t3scan.1.7.5.0

K7 AntiVirus
Unwanted-Program
13.183.13286

Kaspersky
not-a-virus:AdWare.Win32.iBryte
14.0.0.813

Malwarebytes
PUP.Optional.OptimunInstaller
v2016.01.15.09

McAfee
Trojan.Artemis!0D59CA479E98
5600.6520

Microsoft Security Essentials
TrojanClicker:Win32/Clikug.A
1.10401

MicroWorld eScan
Gen:Variant.Application.Kazy.427497
17.0.0.45

NANO AntiVirus
Trojan.Win32.IBryte.ddtkup
0.28.2.61519

Norman
IBryte.PDB
11.20160115

nProtect
Adware.IBryte.AF
14.08.18.01

Panda Antivirus
Trj/Genetic.gen
16.01.15.09

Qihoo 360 Security
Win32/Virus.Adware.cf5
1.0.0.1015

Quick Heal
TrojanDownloader.Badur.A5
1.16.14.00

Reason Heuristics
PUP.Adknowledge.BootCompute.Installer (M)
16.1.15.9

Rising Antivirus
PE:Malware.iBryte!6.192B
23.00.65.16113

SUPERAntiSpyware
PUP.OptimumInstaller/Variant
9384

Trend Micro House Call
TROJ_CLIKUG.A
7.2.15

Trend Micro
TROJ_CLIKUG.A
10.465.15

Vba32 AntiVirus
3.12.26.3

VIPRE Antivirus
Threat.4778314
32186

Zillya! Antivirus
Downloader.Agent.Win32.206074
2.0.0.1899

File size:
255.9 KB (262,008 bytes)

Product version:
2.4.8.1

Copyright:
Copyright (C) 2013 Fusion Install

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Adknowledge Fusion

Language:
English (United States)

Common path:
C:\users\{user}\downloads\setup.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
3/23/2014 7:00:00 PM

Valid to:
3/24/2015 6:59:59 PM

Subject:
CN=Boot Compute, O=Boot Compute, STREET="4600 Madison Ave, 10th FL", L=Kansas City, S=Missouri, PostalCode=64112, C=US

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
059AEF62ABD7F83178378663E98BDE5C

File PE Metadata
Compilation timestamp:
9/14/2014 4:00:22 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
3072:nZPsDJZQTSYcpa5UCuMhYJusGIU7e4/v8lMiY1X7wuNJvjMZFOspn4r7WBJ:nlwjQR5UuEO8lMiwrtBjMZFOspnQ7uJ

Entry address:
0x173BB

Entry point:
E8, C2, 05, 00, 00, E9, D7, FC, FF, FF, CC, FF, 25, 58, 91, 41, 00, 68, 25, 74, 41, 00, 64, FF, 35, 00, 00, 00, 00, 8B, 44, 24, 10, 89, 6C, 24, 10, 8D, 6C, 24, 10, 2B, E0, 53, 56, 57, A1, 1C, E0, 41, 00, 31, 45, FC, 33, C5, 50, 89, 65, E8, FF, 75, F8, 8B, 45, FC, C7, 45, FC, FE, FF, FF, FF, 89, 45, F8, 8D, 45, F0, 64, A3, 00, 00, 00, 00, C3, 8B, 4D, F0, 64, 89, 0D, 00, 00, 00, 00, 59, 5F, 5F, 5E, 5B, 8B, E5, 5D, 51, C3, 8B, FF, 55, 8B, EC, FF, 75, 14, FF, 75, 10, FF, 75, 0C, FF, 75, 08, 68, 66, 6F, 41, 00...
 
[+]

Entropy:
5.2801

Code size:
96 KB (98,304 bytes)

The file setup.exe has been seen being distributed by the following URL.

Remove setup.exe - Powered by Reason Core Security