converted file.exe

Daneil Jemoch

This is a WebPick installer that bundles (with very minimal user consent) a number of adware browser extensions using the JustPlug.it browser framework. The application converted file.exe, “Installer for TopApp soft” by Daneil Jemoch has been detected as adware by 35 anti-malware scanners. The program is a setup application that uses the WebPick InstalleRex (Tarma) installer. The setup program uses Web-Pick's InstalleRex download manager and installer to bundle potentially unwanted ad-supported software which includes toolbars and browser extensions through a pay-per-install monetization scheme.
Publisher:
TopApp soft  (signed by Daneil Jemoch)

Product:
TopApp soft

Description:
Installer for TopApp soft

Version:
2014.5.26.2303

MD5:
6bb9d3794b7b511f11ac7c994c25fb25

SHA-1:
6a9e51a621497a33f4ba531a675ad94f4f434c0d

SHA-256:
2c874c3eeb4106657bf9eccce607c028279bd4a6541e67de61e7e33b3f822382

Scanner detections:
35 / 68

Status:
Adware

Explanation:
Uses the InstalleRex from WebPick Internet Holdings to install bundled add-ons including toolbars and other web browser extensions.

Analysis date:
4/26/2024 10:00:43 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.Generic.11417419
398

Agnitum Outpost
Trojan.AntiFW
7.1.1

AhnLab V3 Security
PUP/Win32.TSULoader
2014.08.16

Avira AntiVirus
TR/AntiFW.b.106
7.11.153.226

avast!
Win32:InstalleRex-CD [PUP]
2014.9-160103

AVG
Generic
2017.0.2876

Bitdefender
Application.Generic.661994
1.0.20.15

Bkav FE
W32.FamVT.AntiFWK.Trojan
1.3.0.4959

Clam AntiVirus
Win.Trojan.Antifw-17
0.98/19900

Comodo Security
Application.Win32.InstalleRex.KG
18477

Dr.Web
Trojan.WebPick.2452
9.0.1.03

Emsisoft Anti-Malware
Trojan.Generic.11417419
8.16.01.03.09

ESET NOD32
Win32/InstalleRex.M potentially unwanted application
10.7.0.302.0

Fortinet FortiGate
Riskware/Generic.AC.4161048
1/3/2016

F-Prot
W32/InstallRex.B
v6.4.6.5.141

F-Secure
Trojan.Generic.11417419
11.2016-03-01_1

G Data
Win32.Application.InstalleRex
16.1.24

IKARUS anti.virus
PUA.IntallBundler
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.181.12872

Kaspersky
Trojan.Win32.AntiFW
14.0.0.873

Malwarebytes
PUP.Optional.InstalleRex
v2016.01.03.09

McAfee
PUP-FHQ
5600.6532

MicroWorld eScan
Trojan.Generic.11425511
17.0.0.9

NANO AntiVirus
Riskware.Win32.InfoLeak.cvgqot
0.28.0.60100

Norman
Trojan.Generic.11417419
11.20160103

nProtect
Trojan/W32.AntiFW.335592
14.07.28.01

Panda Antivirus
PUP/TSUploader
16.01.03.09

Qihoo 360 Security
Malware.QVM20.Gen
1.0.0.1015

Quick Heal
Trojan.AntiFW.A5
1.16.14.00

Reason Heuristics
Adware.WebPick.Installer (M)
16.1.3.9

Rising Antivirus
PE:Trojan.DL.Win32.AntiFW.a!1075355932
23.00.65.16101

Sophos
PUA 'InstallRex'
59

Vba32 AntiVirus
Downware.TSU
3.12.26.0

VIPRE Antivirus
Threat.4753027
31208

Zillya! Antivirus
Trojan.AntiFW.Win32.270
2.0.0.1880

File size:
327.8 KB (335,664 bytes)

Product version:
1.0.0.3

Copyright:
Copyright © 2014 TopApp soft

Original file name:
TSULoader.exe

File type:
Executable application (Win32 EXE)

Installer:
WebPick InstalleRex (Tarma)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\converted file.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
9/1/2013 8:00:00 PM

Valid to:
9/2/2014 7:59:59 PM

Subject:
CN=Daneil Jemoch, O=Daneil Jemoch, STREET=Dubenskay 3, L=Kiev, S=Kiev, PostalCode=03056, C=UA

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
49A39B9858F6FBAB7EFD6CE450878DDB

File PE Metadata
Compilation timestamp:
3/12/2013 4:51:45 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
6144:7rwbUzkuvcBYC47l2xjkCLZhnP5PFcFjYbxfX1wKFw9+1BFsdL+Fu1z:7rlkuveY3TAZhhPqFjYbxfOKF0+ZhFuZ

Entry address:
0x14DB

Entry point:
55, 8B, EC, 81, EC, 2C, 06, 00, 00, 53, 56, 33, DB, 57, 66, 89, 9D, DC, FB, FF, FF, 89, 5D, F4, 89, 5D, FC, FF, 15, 74, 30, 40, 00, A3, 08, 44, 40, 00, FF, 15, 70, 30, 40, 00, 8B, F8, 8D, 45, EC, 50, FF, 15, 6C, 30, 40, 00, FF, 15, 68, 30, 40, 00, 8B, F0, F7, D6, 33, F7, FF, 15, 64, 30, 40, 00, 33, F0, 8B, 45, F0, 33, 45, EC, 68, 04, 01, 00, 00, 33, F0, 8D, 85, D4, F9, FF, FF, 50, 53, FF, 15, 60, 30, 40, 00, 85, C0, 75, 41, FF, 15, 5C, 30, 40, 00, 83, F8, 78, 75, 1A, 68, A8, 32, 40, 00, E8, 43, FB, FF, FF...
 
[+]

Entropy:
7.9271

Developed / compiled with:
Microsoft Visual C++

Code size:
7.5 KB (7,680 bytes)

The file converted file.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to r1.stylezip.info  (54.186.255.26:80)

TCP (HTTP):
Connects to c1.stylezip.info  (54.186.255.26:80)

 
http://c1.stylezip.info/?step_id=1&installer_id=42227728&publisher_id=222&source_id=0&page_id=0&country_code=US&locale=US&browser_id=4&download_id=126683184&external_id=0&session_id=253366368&hardware_id=295594096&installer_file_name=converted+file

Remove converted file.exe - Powered by Reason Core Security