setup.exe

File Monarch

This adware bundler is distributed through Adknowledge's advertising supported software managers. The application setup.exe, “Premium Installer ” by File Monarch has been detected as adware by 40 anti-malware scanners. The program is a setup application that uses the Adknowledge Fusion installer. This program installs potentially unwanted software on your PC at the same time as the software you are trying to install, without adequate consent. The file has been seen being downloaded from thequickdownloads.com.
Publisher:
Premium Installer   (signed by File Monarch)

Product:
Premium Installer

Description:
Premium Installer

Version:
2.4.8.1

MD5:
f014584f57fb85ced5943226e446d33a

SHA-1:
bbd58c9cac2575a9deff483e9f859e1e63f7d598

SHA-256:
b968e8b964419ff1033f24d3c1d56701180af9d50a451c93054e5692efbc7f59

Scanner detections:
40 / 68

Status:
Adware

Explanation:
This installer bundles various adware prorgams that may include toolbars and web browser advertising injectors/extensions.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
11/28/2024 7:45:12 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.IBryte.AF
373

Agnitum Outpost
Trojan.Agent
7.1.1

AhnLab V3 Security
2014.08.17

Avira AntiVirus
Adware/iBryte.bxoh
7.11.166.250

avast!
Win32:PUP-gen [PUP]
2014.9-160128

AVG
Adware AdPlugin
2017.0.2851

Baidu Antivirus
Trojan.Win32.iBryte
4.0.3.16128

Bitdefender
Adware.IBryte.AF
1.0.20.140

Bkav FE
W32.VikesluLTAH.Adware
1.3.0.4959

Clam AntiVirus
Win.Adware.Ibryte-592
0.98/19086

Comodo Security
Application.Win32.AgentCV.HWYE
19181

Dr.Web
Trojan.DownLoader11.30629
9.0.1.028

Emsisoft Anti-Malware
Gen:Variant.Application.Bundler.15
8.16.01.28.10

ESET NOD32
Win32/AdWare.iBryte.AX application
10.7.0.302.0

Fortinet FortiGate
W32/Zbot.AAN!tr
1/28/2016

F-Prot
W32/A-f45b4d3a
v6.4.7.1.166

F-Secure
Adware.IBryte.AF
11.2016-28-01_5

G Data
Adware.IBryte.AF
16.1.24

IKARUS anti.virus
Trojan.Win32.Buzus
t3scan.1.7.5.0

K7 AntiVirus
Unwanted-Program
13.183.13247

Kaspersky
not-a-virus:AdWare.Win32.iBryte
14.0.0.748

Malwarebytes
PUP.Optional.OptimunInstaller
v2016.01.28.10

McAfee
Trojan.Artemis!46F8749DEF37
5600.6507

Microsoft Security Essentials
TrojanClicker:Win32/Clikug.A
1.10401

MicroWorld eScan
Adware.IBryte.AF
17.0.0.84

NANO AntiVirus
Trojan.Win32.IBryte.ddwawl
0.28.2.61721

Norman
IBryte.PDB
11.20160128

nProtect
Adware.IBryte.AF
14.08.18.01

Panda Antivirus
Trj/Genetic.gen
16.01.28.10

Qihoo 360 Security
Win32/Virus.Adware.3fc
1.0.0.1015

Quick Heal
TrojanDownloader.Badur.A5
1.16.14.00

Reason Heuristics
PUP.Adknowledge.FileMonarch.Bundler (M)
16.1.28.10

Rising Antivirus
PE:Malware.iBryte!6.192B
23.00.65.16126

Sophos
iBryte Premium Installer
4.98

SUPERAntiSpyware
PUP.OptimumInstaller/Variant
9358

Trend Micro House Call
TROJ_CLIKUG.A
7.2.28

Trend Micro
TROJ_CLIKUG.A
10.465.28

Vba32 AntiVirus
Downloader.Agent
3.12.26.3

VIPRE Antivirus
Optimum Installer
32198

Zillya! Antivirus
Downloader.Agent.Win32.206054
2.0.0.1900

File size:
142.4 KB (145,784 bytes)

Product version:
2.4.8.1

Copyright:
Copyright (C) Premium Installer

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Adknowledge Fusion

Language:
English (United States)

Common path:
C:\users\{user}\downloads\setup.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
3/17/2014 5:00:00 PM

Valid to:
3/18/2015 4:59:59 PM

Subject:
CN=File Monarch, O=File Monarch, STREET="4600 Madison Ave., FL 10", L=Kansas City, S=Missouri, PostalCode=64112, C=US

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00E65C750985B066CBB7B485ACF86E58B1

File PE Metadata
Compilation timestamp:
8/24/2014 1:54:47 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
1536:XGxYf8IUVv/Cp7ROFL8aXHXlZXLIvZ3oLLhjLmOiU6fEyPXXT0UjcCP:gYf8IUVv/2OFLX1ZbmZJLtjNP

Entry address:
0x53A7

Entry point:
E8, 3C, 05, 00, 00, E9, 36, FD, FF, FF, 8B, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A3, F8, A1, 40, 00, 89, 0D, F4, A1, 40, 00, 89, 15, F0, A1, 40, 00, 89, 1D, EC, A1, 40, 00, 89, 35, E8, A1, 40, 00, 89, 3D, E4, A1, 40, 00, 66, 8C, 15, 10, A2, 40, 00, 66, 8C, 0D, 04, A2, 40, 00, 66, 8C, 1D, E0, A1, 40, 00, 66, 8C, 05, DC, A1, 40, 00, 66, 8C, 25, D8, A1, 40, 00, 66, 8C, 2D, D4, A1, 40, 00, 9C, 8F, 05, 08, A2, 40, 00, 8B, 45, 00, A3, FC, A1, 40, 00, 8B, 45, 04, A3, 00, A2, 40, 00, 8D, 45, 08, A3, 0C, A2, 40...
 
[+]

Entropy:
5.4551

Code size:
20.5 KB (20,992 bytes)

The file setup.exe has been seen being distributed by the following URL.

Remove setup.exe - Powered by Reason Core Security