setup.exe

Fileangels

This adware bundler is distributed through Adknowledge's advertising supported software managers. The application setup.exe, “Premium Installer ” by Fileangels has been detected as adware by 28 anti-malware scanners. The program is a setup application that uses the Adknowledge Fusion installer. The file has been seen being downloaded from lax1.ib.adnxs.com.
Publisher:
Premium Installer   (signed by Fileangels)

Product:
Premium Installer

Description:
Premium Installer

Version:
2.4.8.1

MD5:
8c9b2c4c50cf0af3ab6fc73a5f491f8f

SHA-1:
c0516dd24076259350b2ae74116b987e2ce9ad84

SHA-256:
c3c40384dde3c1c101f6d53b4348259c1471f7ad044f3978bafd31d914824edd

Scanner detections:
28 / 68

Status:
Adware

Explanation:
This installer bundles various adware prorgams that may include toolbars and web browser advertising injectors/extensions.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
12/27/2024 6:33:39 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Application.Graftor.152464
819

Agnitum Outpost
PUA.Agent
7.1.1

AhnLab V3 Security
2014.09.15

Avira AntiVirus
ADWARE/iBryte.Gen4
7.11.179.82

avast!
Win32:Adware-gen [Adw]
2014.9-141107

AVG
AdPlugin
2015.0.3297

Bitdefender
Gen:Variant.Application.Graftor.152464
1.0.20.1555

Clam AntiVirus
Win.Adware.Ibryte-3990
0.98/19466

Comodo Security
Application.Win32.AgentCV.HWYE
19489

Dr.Web
Adware.iBryte.486
9.0.1.0311

Emsisoft Anti-Malware
Gen:Variant.Application.Graftor.152464
8.14.11.07.05

ESET NOD32
Win32/AdWare.iBryte.BK (variant)
8.10579

Fortinet FortiGate
W32/Zbot.AAN!tr
11/7/2014

F-Prot
W32/A-34fffba4
v6.4.7.1.166

F-Secure
Gen:Variant.Application.Graftor
11.2014-07-11_6

G Data
Win32.Adware.IBryte
14.11.24

IKARUS anti.virus
AdWare.AdPlugin
t3scan.1.7.8.0

K7 AntiVirus
Unwanted-Program
13.183.13345

Kaspersky
Trojan.Win32.Badur
15.0.0.494

Malwarebytes
PUP.Optional.OptimunInstaller
v2014.11.07.05

McAfee
IBryte-FRT
5600.6953

MicroWorld eScan
Gen:Variant.Application.Graftor.152464
15.0.0.933

NANO AntiVirus
Riskware.Win32.IBryte.desauy
0.28.2.61942

nProtect
Trojan-Clicker/W32.iBryte.83312.E
14.10.01.01

Reason Heuristics
PUP.Installer.Fileangels.F
14.11.7.17

Vba32 AntiVirus
3.12.26.3

VIPRE Antivirus
Threat.4778314
33706

Zillya! Antivirus
Trojan.Buzus.Win32.122155
2.0.0.1929

File size:
78.9 KB (80,752 bytes)

Product version:
2.4.8.1

Copyright:
Copyright (C) Premium Installer

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Adknowledge Fusion

Language:
English (United States)

Common path:
C:\users\{user}\downloads\setup.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
7/13/2014 7:00:00 PM

Valid to:
7/14/2015 6:59:59 PM

Subject:
CN=Fileangels, O=Fileangels, STREET=4600 Madison Ave FL 10, L=Kansas City, S=Missouri, PostalCode=64112, C=US

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
1D54F646CB5A85211464AF0FDAB3D591

File PE Metadata
Compilation timestamp:
11/7/2014 4:00:22 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
768:vQhMZp0tdmrlSBhTqyi88viJMHJYM5wOetW3eUZjwyDOJJuio8d:vzZ2tbhFiahDOO6P9Id

Entry address:
0x60A1

Entry point:
E8, 42, 05, 00, 00, E9, 36, FD, FF, FF, CC, FF, 25, F4, 71, 40, 00, 6A, 14, 68, 40, A4, 40, 00, E8, B2, 00, 00, 00, FF, 35, 34, D4, 40, 00, 8B, 35, D4, 71, 40, 00, FF, D6, 59, 89, 45, E4, 83, F8, FF, 75, 0C, FF, 75, 08, FF, 15, D0, 71, 40, 00, 59, EB, 67, 6A, 08, E8, A2, 05, 00, 00, 59, 83, 65, FC, 00, FF, 35, 34, D4, 40, 00, FF, D6, 89, 45, E4, FF, 35, 30, D4, 40, 00, FF, D6, 59, 59, 89, 45, E0, 8D, 45, E0, 50, 8D, 45, E4, 50, FF, 75, 08, 8B, 35, BC, 71, 40, 00, FF, D6, 59, 50, E8, 65, 05, 00, 00, 89, 45...
 
[+]

Entropy:
5.8091

Code size:
23.5 KB (24,064 bytes)

The file setup.exe has been seen being distributed by the following URL.

Remove setup.exe - Powered by Reason Core Security