converted file.exe

Daneil Jemoch

This is a WebPick installer that bundles (with very minimal user consent) a number of adware browser extensions which inject ads in the browser. The application converted file.exe, “Installer for Excellent4App” by Daneil Jemoch has been detected as adware by 35 anti-malware scanners. The program is a setup application that uses the WebPick InstalleRex (Tarma) installer. The setup program uses Web-Pick's InstalleRex download manager and installer to bundle potentially unwanted ad-supported software which includes toolbars and browser extensions through a pay-per-install monetization scheme.
Publisher:
Excellent4App  (signed by Daneil Jemoch)

Product:
Excellent4App

Description:
Installer for Excellent4App

Version:
2014.5.18.1727

MD5:
eca409539ffb49e4be7c9760d57db31b

SHA-1:
bbe7e534480136eb780d4d86eeb0303e4546b118

SHA-256:
3d26ddac646b137d6c1b3798fbb5ef05fbe0ca4d5d2a6da450569ceea2724893

Scanner detections:
35 / 68

Status:
Adware

Explanation:
Uses the InstalleRex from WebPick Internet Holdings to install bundled add-ons including toolbars and other web browser extensions.

Analysis date:
4/25/2024 10:54:55 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.Generic.11446593
382

Agnitum Outpost
Trojan.AntiFW
7.1.1

AhnLab V3 Security
PUP/Win32.TSULoader
2014.12.30

Avira AntiVirus
ADWARE/InstallRex.Gen
7.11.198.178

avast!
Win32:InstalleRex-CD [PUP]
2014.9-160118

AVG
Generic
2017.0.2860

Bitdefender
Trojan.Generic.11440217
1.0.20.90

Bkav FE
W32.FamVT.AntiFWK.Trojan
1.3.0.4959

Clam AntiVirus
Win.Trojan.Antifw-5
0.98/20230

Comodo Security
Application.Win32.InstalleRex.KG
20528

Dr.Web
Trojan.WebPick.2452
9.0.1.018

Emsisoft Anti-Malware
Trojan.Generic.11431946
8.16.01.18.02

ESET NOD32
Win32/InstalleRex.M potentially unwanted application
10.7.0.302.0

Fortinet FortiGate
Riskware/Generic.AC.4161048
1/18/2016

F-Prot
W32/InstallRex.B
v6.4.6.5.141

F-Secure
Trojan.Generic.11446593
11.2016-18-01_2

G Data
Trojan.Generic.11440217
16.1.24

IKARUS anti.virus
PUA.InstallBundler
t3scan.1.7.5.0

K7 AntiVirus
Unwanted-Program
13.188.14484

Kaspersky
Trojan.Win32.AntiFW
14.0.0.797

Malwarebytes
PUP.Optional.Excellent4App
v2016.01.18.02

McAfee
PUP-FHQ
5600.6516

MicroWorld eScan
Trojan.Generic.11431946
17.0.0.54

NANO AntiVirus
Riskware.Win32.InfoLeak.cvgqot
0.30.0.64448

Norman
Trojan.Generic.11446593
11.20160118

nProtect
Trojan/W32.AntiFW.335712
14.10.01.01

Panda Antivirus
PUP/TSUploader
16.01.18.02

Qihoo 360 Security
Malware.QVM20.Gen
1.0.0.1015

Quick Heal
Trojan.AntiFW.A5
1.16.14.00

Reason Heuristics
Adware.WebPick.Installer (M)
16.1.18.14

Rising Antivirus
PE:Trojan.DL.Win32.AntiFW.a!1075355932
23.00.65.16116

Sophos
PUA 'InstallRex'
5.11

Vba32 AntiVirus
Downware.TSU
3.12.26.3

VIPRE Antivirus
Threat.14871
33120

Zillya! Antivirus
Trojan.AntiFW.Win32.259
2.0.0.2021

File size:
327.8 KB (335,680 bytes)

Product version:
1.0.0.3

Copyright:
Copyright © 2014 Excellent4App

Original file name:
TSULoader.exe

File type:
Executable application (Win32 EXE)

Installer:
WebPick InstalleRex (Tarma)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\converted file.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
9/2/2013 1:00:00 AM

Valid to:
9/3/2014 12:59:59 AM

Subject:
CN=Daneil Jemoch, O=Daneil Jemoch, STREET=Dubenskay 3, L=Kiev, S=Kiev, PostalCode=03056, C=UA

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
49A39B9858F6FBAB7EFD6CE450878DDB

File PE Metadata
Compilation timestamp:
3/12/2013 8:51:45 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
6144:arpbUzkuvcBYC47l2xGEjgdzOUUb1Qkhh7p36WgR7VVM4P:arakuveY3pSgdCUUnRM8C

Entry address:
0x14DB

Entry point:
55, 8B, EC, 81, EC, 2C, 06, 00, 00, 53, 56, 33, DB, 57, 66, 89, 9D, DC, FB, FF, FF, 89, 5D, F4, 89, 5D, FC, FF, 15, 74, 30, 40, 00, A3, 08, 44, 40, 00, FF, 15, 70, 30, 40, 00, 8B, F8, 8D, 45, EC, 50, FF, 15, 6C, 30, 40, 00, FF, 15, 68, 30, 40, 00, 8B, F0, F7, D6, 33, F7, FF, 15, 64, 30, 40, 00, 33, F0, 8B, 45, F0, 33, 45, EC, 68, 04, 01, 00, 00, 33, F0, 8D, 85, D4, F9, FF, FF, 50, 53, FF, 15, 60, 30, 40, 00, 85, C0, 75, 41, FF, 15, 5C, 30, 40, 00, 83, F8, 78, 75, 1A, 68, A8, 32, 40, 00, E8, 43, FB, FF, FF...
 
[+]

Entropy:
7.9276

Developed / compiled with:
Microsoft Visual C++

Code size:
7.5 KB (7,680 bytes)

The file converted file.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to r1.stylezip.info  (54.186.255.26:80)

Remove converted file.exe - Powered by Reason Core Security