converted file.exe

Daneil Jemoch

This is a WebPick installer that bundles (with very minimal user consent) a number of adware browser extensions which inject ads in the browser. The application converted file.exe, “Installer for AllaboutApp” by Daneil Jemoch has been detected as adware by 35 anti-malware scanners. The program is a setup application that uses the WebPick InstalleRex (Tarma) installer. The setup program uses Web-Pick's InstalleRex download manager and installer to bundle potentially unwanted ad-supported software which includes toolbars and browser extensions through a pay-per-install monetization scheme.
Publisher:
AllaboutApp  (signed by Daneil Jemoch)

Product:
AllaboutApp

Description:
Installer for AllaboutApp

Version:
2014.5.14.1933

MD5:
2f47ba575c47189275165f8a5da5db9f

SHA-1:
28c55295ab84f8455350a8ef08af26755cb38798

SHA-256:
26151429b4066cfba1436c930b0b3889f64e52553369b58c1e2d648703429026

Scanner detections:
35 / 68

Status:
Adware

Explanation:
Uses the InstalleRex from WebPick Internet Holdings to install bundled add-ons including toolbars and other web browser extensions.

Analysis date:
4/25/2024 8:07:57 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Generic.660118
406

Agnitum Outpost
PUA.InstalleRex
7.1.1

AhnLab V3 Security
PUP/Win32.TSULoader
2014.07.05

Avira AntiVirus
Adware/InstallRex.A.13
7.11.158.138

avast!
Win32:InstalleRex-CD [PUP]
2014.9-151226

AVG
Generic
2016.0.2884

Bitdefender
Application.Generic.658457
1.0.20.1800

Bkav FE
HW32.CDB
1.3.0.4959

Clam AntiVirus
Win.Trojan.Installerex-10
0.98/19086

Comodo Security
Application.Win32.InstalleRex.KG
18765

Dr.Web
Trojan.WebPick.2452
9.0.1.0360

Emsisoft Anti-Malware
Application.Generic.660118
8.15.12.26.08

ESET NOD32
Win32/InstalleRex.M potentially unwanted application
9.7.0.302.0

Fortinet FortiGate
Riskware/Generic.AC.4161048
12/26/2015

F-Prot
W32/InstallRex.B
v6.4.6.5.141

F-Secure
Riskware.Application.Generic.660118
11.2015-26-12_7

G Data
Application.Generic.658457
15.12.24

IKARUS anti.virus
PUA.InstallBundler
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.180.12626

Kaspersky
Trojan.Win32.AntiFW
14.0.0.913

Malwarebytes
PUP.Optional.InstalleRex
v2015.12.26.08

McAfee
PUP-FHQ
5600.6540

MicroWorld eScan
Trojan.Generic.11420502
16.0.0.1080

NANO AntiVirus
Riskware.Win32.InfoLeak.cvgqot
0.28.0.60577

Norman
Application.Generic.660118
11.20151226

nProtect
Trojan/W32.AntiFW.335176
14.08.14.01

Panda Antivirus
PUP/TSUploader
15.12.26.08

Qihoo 360 Security
Malware.QVM20.Gen
1.0.0.1015

Quick Heal
Trojan.AntiFW.A5
12.15.14.00

Reason Heuristics
Adware.WebPick.Installer (M)
15.12.26.8

Rising Antivirus
PE:Trojan.DL.Win32.AntiFW.a!1075355932
23.00.65.151224

Sophos
PUA 'InstallRex'
5.12

Vba32 AntiVirus
Downware.TSU
3.12.26.3

VIPRE Antivirus
Threat.4753027
29708

Zillya! Antivirus
Trojan.AntiFW.Win32.255
2.0.0.1845

File size:
327.3 KB (335,160 bytes)

Product version:
1.0.0.3

Copyright:
Copyright © 2014 AllaboutApp

Original file name:
TSULoader.exe

File type:
Executable application (Win32 EXE)

Installer:
WebPick InstalleRex (Tarma)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\converted file.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
9/1/2013 8:00:00 PM

Valid to:
9/2/2014 7:59:59 PM

Subject:
CN=Daneil Jemoch, O=Daneil Jemoch, STREET=Dubenskay 3, L=Kiev, S=Kiev, PostalCode=03056, C=UA

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
49A39B9858F6FBAB7EFD6CE450878DDB

File PE Metadata
Compilation timestamp:
3/12/2013 4:51:45 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
6144:trcbUzkuvcBYC47l2xh6UXujU/6HXgnAv0FSArgxb1BQ5m:trhkuveY3QwU/hXQDbvKm

Entry address:
0x14DB

Entry point:
55, 8B, EC, 81, EC, 2C, 06, 00, 00, 53, 56, 33, DB, 57, 66, 89, 9D, DC, FB, FF, FF, 89, 5D, F4, 89, 5D, FC, FF, 15, 74, 30, 40, 00, A3, 08, 44, 40, 00, FF, 15, 70, 30, 40, 00, 8B, F8, 8D, 45, EC, 50, FF, 15, 6C, 30, 40, 00, FF, 15, 68, 30, 40, 00, 8B, F0, F7, D6, 33, F7, FF, 15, 64, 30, 40, 00, 33, F0, 8B, 45, F0, 33, 45, EC, 68, 04, 01, 00, 00, 33, F0, 8D, 85, D4, F9, FF, FF, 50, 53, FF, 15, 60, 30, 40, 00, 85, C0, 75, 41, FF, 15, 5C, 30, 40, 00, 83, F8, 78, 75, 1A, 68, A8, 32, 40, 00, E8, 43, FB, FF, FF...
 
[+]

Entropy:
7.9302

Developed / compiled with:
Microsoft Visual C++

Code size:
7.5 KB (7,680 bytes)

The file converted file.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to r1.stylezip.info  (54.186.255.26:80)

Remove converted file.exe - Powered by Reason Core Security