download.exe

LightWare

Ivan Kostin

This program bundles adware during the download and install process using the InstaleRex pay-per-install app monetizer. The application download.exe, “Installer for LightWare” by Ivan Kostin has been detected as adware by 29 anti-malware scanners. The program is a setup application that uses the WebPick InstalleRex (Tarma) installer. The setup program uses Web-Pick's InstalleRex download manager and installer to bundle potentially unwanted ad-supported software which includes toolbars and browser extensions through a pay-per-install monetization scheme.
Publisher:
SoftWarehouse  (signed by Ivan Kostin)

Product:
LightWare

Description:
Installer for LightWare

Version:
2014.1.2.2002

MD5:
b325f41b4b6ef34aa3275b79410a450c

SHA-1:
c3e4b5daae06cac7217985c1145803235ac06c72

SHA-256:
567768ea3a0064463f8799b962932d08a746cc49d34f16e5f78afbaf6c16b691

Scanner detections:
29 / 68

Status:
Adware

Explanation:
Uses the InstalleRex from WebPick Internet Holdings to install bundled add-ons including toolbars and other web browser extensions.

Analysis date:
4/25/2024 12:04:19 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.InstalleRex
7.1.1

AhnLab V3 Security
PUP/Win32.TSULoader
2014.06.20

Avira AntiVirus
Adware/InstallRex.Q
7.11.155.192

avast!
Win32:InstalleRex-AI [PUP]
141214-1

AVG
Generic
2015.0.3258

Bkav FE
HW32.CDB
1.3.0.4959

Clam AntiVirus
Win.Trojan.Installerex-19
0.98/19788

Comodo Security
Application.Win32.InstalleRex.KG
18598

Dr.Web
Trojan.WebPick.4
9.0.1.05190

ESET NOD32
Win32/InstalleRex.M potentially unwanted application
7.0.302.0

Fortinet FortiGate
Riskware/InstalleRex
12/16/2014

F-Prot
W32/InstallRex.B
4.6.5.141

G Data
Win32.Application.InstalleRex
14.12.24

IKARUS anti.virus
PUP.InstallRex
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.180.12463

Kaspersky
Trojan.Win32.AntiFW
15.0.0.543

Malwarebytes
PUP.Optional.InstalleRex
v2014.12.16.05

McAfee
Program.PUP-FHQ
16.8.708.2

NANO AntiVirus
Riskware.Win32.Downware.csjrze
0.28.0.60253

nProtect
Backdoor/W32.Clack.320696
14.06.27.01

Panda Antivirus
PUP/TSUploader
14.12.16.05

Qihoo 360 Security
Malware.QVM20.Gen
1.0.0.1015

Quick Heal
Trojan.AntiFW.A5
12.14.14.00

Reason Heuristics
Adware.WebPick.Installer.I
14.12.16.17

Rising Antivirus
PE:Malware.Adload!6.126C
23.00.65.141214

Sophos
PUA 'InstallRex'
5.09

Vba32 AntiVirus
Downware.TSU
3.12.26.3

VIPRE Antivirus
Threat.4753027
29708

Zillya! Antivirus
Downloader.Adload.Win32.16938
2.0.0.1831

File size:
313.2 KB (320,672 bytes)

Product version:
1.0.0.1

Copyright:
Copyright © 2014 SoftWarehouse

Original file name:
TSULoader.exe

File type:
Executable application (Win32 EXE)

Installer:
WebPick InstalleRex (Tarma)

Language:
Swedish (Sweden)

Common path:
C:\users\{user}\downloads\download.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
8/25/2013 2:00:00 AM

Valid to:
8/26/2014 1:59:59 AM

Subject:
CN=Ivan Kostin, O=Ivan Kostin, STREET=Pobedy 33/1, L=Kyiv, S=Kyiv, PostalCode=03170, C=UA

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00EB11D24CE6DDBBF752FE4DC3D683D2BF

File PE Metadata
Compilation timestamp:
3/12/2013 9:51:45 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
6144:irJ9uEo2S1YnQmCX492DkwNP3qpYFkwlWKM23DpJQ+JXUOy1Lr3Dv1A+CiyGdUz6:irfu6/eIo4XwlWKM231t5UnRr3DdRp5/

Entry address:
0x14DB

Entry point:
55, 8B, EC, 81, EC, 2C, 06, 00, 00, 53, 56, 33, DB, 57, 66, 89, 9D, DC, FB, FF, FF, 89, 5D, F4, 89, 5D, FC, FF, 15, 74, 30, 40, 00, A3, 08, 44, 40, 00, FF, 15, 70, 30, 40, 00, 8B, F8, 8D, 45, EC, 50, FF, 15, 6C, 30, 40, 00, FF, 15, 68, 30, 40, 00, 8B, F0, F7, D6, 33, F7, FF, 15, 64, 30, 40, 00, 33, F0, 8B, 45, F0, 33, 45, EC, 68, 04, 01, 00, 00, 33, F0, 8D, 85, D4, F9, FF, FF, 50, 53, FF, 15, 60, 30, 40, 00, 85, C0, 75, 41, FF, 15, 5C, 30, 40, 00, 83, F8, 78, 75, 1A, 68, A8, 32, 40, 00, E8, 43, FB, FF, FF...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
7.5 KB (7,680 bytes)

The file download.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to r1.stylezip.info  (54.186.255.26:80)

Remove download.exe - Powered by Reason Core Security