cr_downloader_for_bloody-roar-ii.exe

eCHANG Net Inc.

The installer utilizes the installCore download manager which may bundle additional offers for various ad-supported toolbars, extensions and utilities. The application cr_downloader_for_bloody-roar-ii.exe by eCHANG Net has been detected as adware by 12 anti-malware scanners. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. The file has been seen being downloaded from coolrom.com.
Publisher:
eCHANG Net Inc.  (signed and verified)

MD5:
c4c14a553c1d50a2459dc196cf267e67

SHA-1:
f7ca3e8b89726b77c888e2b3d8af1c6e64727d99

SHA-256:
745b7b4763fcf676a7355d86e6aa8f61e8d80c0388f6c76c228fd2e151ce5cc6

Scanner detections:
12 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
5/21/2024 2:13:17 AM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
7.11.167.204

AVG
Generic
2015.0.3387

Dr.Web
Adware.InstallCore.417
9.0.1.0221

ESET NOD32
Win32/InstallCore.PK potentially unwanted application
8.7.0.302.0

K7 AntiVirus
Trojan
13.183.13054

Malwarebytes
v2014.08.09.10

McAfee
Trojan.Artemis!C4C14A553C1D
16.8.708.2

Reason Heuristics
PUP.eCHANGNet.a
14.8.9.21

SUPERAntiSpyware
10431

VIPRE Antivirus
Threat.4150696
32210

File size:
681.7 KB (698,056 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\cr_downloader_for_bloody-roar-ii.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
3/30/2014 5:00:00 PM

Valid to:
3/31/2015 4:59:59 PM

Subject:
CN=eCHANG Net Inc., O=eCHANG Net Inc., STREET=3108 Willow Street, L=Vancouver, S=British Columbia, PostalCode=V5Z3P5, C=CA

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
0997D086DE4B5F5B73AA93E13ED58468

File PE Metadata
Compilation timestamp:
6/19/1992 3:22:17 PM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:+dFaHe788qt3sAabr9O0cer9wgysAtvSBLM1pnxeVf9WHCRpud0ICbD:+dFK088Sqr9wNsd21pnUVf9WiRpzIu

Entry address:
0x9C40

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, 86, 94, FF, FF, E8, 8D, A6, FF, FF, E8, 1C, A9, FF, FF, E8, BF, A9, FF, FF, E8, 5E, C9, FF, FF, E8, C9, F2, FF, FF, E8, 30, F4, FF, FF, 33, C0, 55, 68, FC, A2, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, C5, A2, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 96, FE, FF, FF, E8, C9, FA, FF, FF, 8D, 55, F0, 33, C0, E8, 83, CF, FF, FF, 8B, 55, F0, B8, 24, CE, 40, 00, E8, 32, 95, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, 24, CE...
 
[+]

Entropy:
7.8836

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
37 KB (37,888 bytes)

The file cr_downloader_for_bloody-roar-ii.exe has been seen being distributed by the following URL.

Remove cr_downloader_for_bloody-roar-ii.exe - Powered by Reason Core Security