setup.exe

File Monarch

This adware bundler is distributed through Adknowledge's advertising supported software managers. The application setup.exe, “Installer Pack ” by File Monarch has been detected as adware by 40 anti-malware scanners. The program is a setup application that uses the Adknowledge Fusion installer. This program installs potentially unwanted software on your PC at the same time as the software you are trying to install, without adequate consent. The file has been seen being downloaded from dbc.flvvideodownload.com.
Publisher:
Installer Pack   (signed by File Monarch)

Product:
Installer Pack

Description:
Installer Pack

Version:
2.4.8.1

MD5:
26cc2e0dc0baee3cf48b531c700b412f

SHA-1:
b0c81c1c42a94bc29f81cc11575aacd738f6fbf1

SHA-256:
b51eae595b330104c33355de4aed760918da530288dc491f0f90eb147966ff75

Scanner detections:
40 / 68

Status:
Adware

Explanation:
This installer bundles various adware prorgams that may include toolbars and web browser advertising injectors/extensions.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/26/2024 12:45:40 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Application.Bundler.25
379

Agnitum Outpost
PUA.Downloader
7.1.1

AhnLab V3 Security
PUP/Win32.DomaIQ
2014.08.16

Avira AntiVirus
Adware/iBryte.bxng
7.11.166.222

avast!
Win32:Adware-gen [Adw]
2014.9-160122

AVG
Adware AdPlugin
2017.0.2857

Baidu Antivirus
Trojan.Win32.iBryte
4.0.3.16122

Bitdefender
Gen:Variant.Application.Kazy.427497
1.0.20.110

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Ibryte-592
0.98/19086

Comodo Security
Application.Win32.AgentCV.HWYE
19174

Dr.Web
Trojan.DownLoader11.30617
9.0.1.022

Emsisoft Anti-Malware
Gen:Variant.Application.Bundler.25
8.16.01.22.06

ESET NOD32
Win32/AdWare.iBryte.BB application
10.7.0.302.0

Fortinet FortiGate
W32/Zbot.AAN!tr
1/22/2016

F-Prot
W32/A-c255719d
v6.4.7.1.166

F-Secure
Riskware.Gen:Variant.Application.Bundler
11.2016-22-01_6

G Data
Gen:Variant.Application.Kazy.427497
16.1.24

IKARUS anti.virus
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.177.12013

Kaspersky
not-a-virus:AdWare.Win32.iBryte
14.0.0.779

Malwarebytes
PUP.Optional.OptimunInstaller
v2016.01.22.06

McAfee
Trojan.Artemis!154D67201E86
5600.6513

Microsoft Security Essentials
TrojanClicker:Win32/Clikug.A
1.10401

MicroWorld eScan
Gen:Variant.Application.Kazy.427497
17.0.0.66

NANO AntiVirus
Trojan.Win32.IBryte.ddtkup
0.28.2.61519

Norman
Gen:Variant.Application.Bundler.25
11.20160122

nProtect
Adware.IBryte.AF
14.08.17.01

Panda Antivirus
Trj/Genetic.gen
16.01.22.06

Qihoo 360 Security
Malware.QVM10.Gen
1.0.0.1015

Quick Heal
TrojanDownloader.Badur.A5
1.16.14.00

Reason Heuristics
PUP.Adknowledge.FileMonarch.Bundler (M)
16.1.22.6

Rising Antivirus
PE:Malware.iBryte!6.192B
23.00.65.16120

Sophos
PUA 'iBryte Premium Installer' (of type Adware)
59

SUPERAntiSpyware
PUP.OptimumInstaller/Variant
9370

Trend Micro House Call
TROJ_CLIKUG.A
7.2.22

Trend Micro
TROJ_CLIKUG.A
10.465.22

Vba32 AntiVirus
3.12.26.0

VIPRE Antivirus
Threat.4778314
31208

Zillya! Antivirus
Adware.iBryte.Win32.854
2.0.0.1790

File size:
131.4 KB (134,520 bytes)

Product version:
2.4.8.1

Copyright:
Copyright (C) Installer Pack

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Adknowledge Fusion

Language:
English (United States)

Common path:
C:\users\{user}\downloads\setup.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
3/18/2014 1:00:00 AM

Valid to:
3/19/2015 12:59:59 AM

Subject:
CN=File Monarch, O=File Monarch, STREET="4600 Madison Ave., FL 10", L=Kansas City, S=Missouri, PostalCode=64112, C=US

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00E65C750985B066CBB7B485ACF86E58B1

File PE Metadata
Compilation timestamp:
8/29/2014 7:15:11 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
3072:vKbUFjkhuuHimIjud0657Jay2P1BQOlqMXrIakTCm+Ph:VZHQOlxZ

Entry address:
0x7A61

Entry point:
E8, 55, 05, 00, 00, E9, 36, FD, FF, FF, CC, FF, 25, 94, 91, 40, 00, FF, 25, 90, 91, 40, 00, 68, D1, 7A, 40, 00, 64, FF, 35, 00, 00, 00, 00, 8B, 44, 24, 10, 89, 6C, 24, 10, 8D, 6C, 24, 10, 2B, E0, 53, 56, 57, A1, 1C, C0, 40, 00, 31, 45, FC, 33, C5, 50, 89, 65, E8, FF, 75, F8, 8B, 45, FC, C7, 45, FC, FE, FF, FF, FF, 89, 45, F8, 8D, 45, F0, 64, A3, 00, 00, 00, 00, C3, 8B, 4D, F0, 64, 89, 0D, 00, 00, 00, 00, 59, 5F, 5F, 5E, 5B, 8B, E5, 5D, 51, C3, 8B, FF, 55, 8B, EC, FF, 75, 14, FF, 75, 10, FF, 75, 0C, FF, 75...
 
[+]

Code size:
31.5 KB (32,256 bytes)

The file setup.exe has been seen being distributed by the following URL.

Remove setup.exe - Powered by Reason Core Security