freeocrtoword.exe

Software

TechEvolve GMBH

The application freeocrtoword.exe, “Software Setup ” by TechEvolve GMBH has been detected as a potentially unwanted program by 13 anti-malware scanners. The program is a setup application that uses the Inno Setup installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. The file has been seen being downloaded from download.findmysoft.com and multiple other hosts. While running, it connects to the Internet address li918-213.members.linode.com on port 80 using the HTTP protocol.
Publisher:
FreeAudioVideo  (signed by TechEvolve GMBH)

Product:
Software

Description:
Software Setup

Version:
1.0.5.a0.1_33595

MD5:
7c2c9ab90a46ca352fa306f977d8f61e

SHA-1:
0a88d580d9d4829b581b61cdaae3ec20310ca1c8

SHA-256:
b709aa45a3cc7363905bd34f81bad0632f23c58e38864308be1cfc79966d353c

Scanner detections:
13 / 68

Status:
Potentially unwanted

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Analysis date:
4/26/2024 9:46:46 PM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
7.11.203.220

Baidu Antivirus
Adware.Win32.InstallCore
4.0.3.15123

Dr.Web
Trojan.InstallCore.11
9.0.1.023

ESET NOD32
Win32/InstallCore.VO (variant)
9.11049

Fortinet FortiGate
Riskware/InstallCore
1/23/2015

K7 AntiVirus
Unwanted-Program
13.191.14711

McAfee
Artemis!7C2C9AB90A46
5600.6876

NANO AntiVirus
Riskware.Win32.InstallCore.djeejm
0.30.0.64812

Norman
InstallCore.CERT
11.20150123

Reason Heuristics
PUP.Optional.Installer
15.1.23.15

Sophos
Generic PUA AK
4.98

Trend Micro House Call
Suspicious_GEN.F47V0119
7.2.23

VIPRE Antivirus
InstallCore
36846

File size:
678.6 KB (694,872 bytes)

Product version:
2.6

File type:
Executable application (Win32 EXE)

Installer:
Inno Setup

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\freeocrtoword.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
12/15/2012 4:00:00 PM

Valid to:
12/16/2015 3:59:59 PM

Subject:
CN=TechEvolve GMBH, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=TechEvolve GMBH, L=Beijing, S=Beijing, C=CN

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
50FF3D5C361AE9F52E4B0A3CF576C6EE

File PE Metadata
Compilation timestamp:
6/19/1992 3:22:17 PM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:Rlvpk2goeFY/IcEPTVuYCHLRd4fpdhZYXD8e7oNc5JQVAXjUmPXyrQpAVNwNGVx:Rlvy2gloIDDaLofzYAeYqJIypawNM

Entry address:
0x9C40

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, 86, 94, FF, FF, E8, 8D, A6, FF, FF, E8, 1C, A9, FF, FF, E8, 53, C9, FF, FF, E8, 9A, C9, FF, FF, E8, C9, F2, FF, FF, E8, 30, F4, FF, FF, 33, C0, 55, 68, FC, A2, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, C5, A2, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 96, FE, FF, FF, E8, C9, FA, FF, FF, 8D, 55, F0, 33, C0, E8, 83, CF, FF, FF, 8B, 55, F0, B8, 24, CE, 40, 00, E8, 32, 95, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, 24, CE...
 
[+]

Entropy:
7.8923

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
37 KB (37,888 bytes)

The file freeocrtoword.exe has been seen being distributed by the following 2 URLs.

http://download.findmysoft.com/2015/01/.../free-ocr-to-word_5.6.5.exe

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ec2-52-50-196-247.eu-west-1.compute.amazonaws.com  (52.50.196.247:80)

TCP (HTTP):
Connects to li918-213.members.linode.com  (45.56.68.213:80)

TCP (HTTP):
Connects to hosted-by.leaseweb.com  (199.58.87.151:80)

TCP (HTTP):
Connects to ec2-54-191-59-48.us-west-2.compute.amazonaws.com  (54.191.59.48:80)

TCP (HTTP):
Connects to ec2-54-186-47-57.us-west-2.compute.amazonaws.com  (54.186.47.57:80)

TCP (HTTP):
Connects to 92b91b35.rdns.100tb.com  (146.185.27.53:80)

TCP (HTTP):
Connects to ec2-54-154-229-88.eu-west-1.compute.amazonaws.com  (54.154.229.88:80)

TCP (HTTP):
Connects to ec2-54-154-190-87.eu-west-1.compute.amazonaws.com  (54.154.190.87:80)

TCP (HTTP):
Connects to ec2-52-30-150-214.eu-west-1.compute.amazonaws.com  (52.30.150.214:80)

TCP (HTTP):
Connects to ec2-52-214-247-42.eu-west-1.compute.amazonaws.com  (52.214.247.42:80)

TCP (HTTP):
Connects to ec2-52-208-40-227.eu-west-1.compute.amazonaws.com  (52.208.40.227:80)

TCP (HTTP):
Connects to ec2-52-206-2-43.compute-1.amazonaws.com  (52.206.2.43:80)

TCP (HTTP SSL):
Connects to a23-207-140-79.deploy.static.akamaitechnologies.com  (23.207.140.79:443)

Remove freeocrtoword.exe - Powered by Reason Core Security