icreinstall_adobe_flash_setup.exe

STMSetup

The installer utilizes InstallCore which may bundle about 3-4 offers for various ad-supported toolbars, extensions and utilities. The application icreinstall_adobe_flash_setup.exe by STMSetup has been detected as adware by 15 anti-malware scanners. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. It is also typically executed from the user's temporary directory. While running, it connects to the Internet address os.solvefile.com on port 80 using the HTTP protocol.
Publisher:
STMSetup  (signed and verified)

MD5:
6ee6294e13636b76f162a7942988e050

SHA-1:
106bcc6fdcc5de65e15021bbba8827385d0db4a8

SHA-256:
90738cdbe8416a56d249017d72e7a8779493ecba5e30d2818e1d52727b821583

Scanner detections:
15 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This is an installer which may bundle legitimate applications with offers for additional 3rd-party applications that may be unwanted by the user. While the installer contains an 'opt-out' feature this is not set be defult and is usually overlooked.

Analysis date:
4/18/2024 3:40:43 AM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
PUP/Win32.InstallCore
2014.11.01

Avira AntiVirus
7.11.182.172

AVG
Generic
2015.0.3304

Dr.Web
Adware.InstallCore.386
9.0.1.05190

ESET NOD32
Win32/InstallCore.QC potentially unwanted application
7.0.302.0

K7 AntiVirus
Unwanted-Program
13.185.13866

Malwarebytes
v2014.11.01.12

NANO AntiVirus
Riskware.Win32.InstallCore.dgyiew
0.28.6.62995

Norman
InstallCore.CERT
11.20141101

Qihoo 360 Security
Malware.QVM06.Gen
1.0.0.1015

Reason Heuristics
PUP.Installer.STMSetup.DD
14.10.31.23

SUPERAntiSpyware
Trojan.Agent/Gen-Cryptor
10265

Vba32 AntiVirus
Malware-Cryptor.InstallCore.gen
3.12.26.3

VIPRE Antivirus
Threat.4786018
34232

File size:
763.3 KB (781,632 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\temp\icreinstall_adobe_flash_setup.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
4/27/2014 8:00:00 PM

Valid to:
4/28/2015 7:59:59 PM

Subject:
CN=STMSetup, O=STMSetup, STREET=28 Lenelblome St., L=Tel-Aviv, S=Israel, PostalCode=651307, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
4CC8AF2C057FC32A3FA7F44EAADD7EEA

File PE Metadata
Compilation timestamp:
6/19/1992 6:22:17 PM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:WavpRwJ8g/199VRJFrA1vJhm0/YQVLnK7EZ5BHq/dTJ4P3VkIXK9F:WavoKif9VfyU0/YQVLnKoqRJ4PlkhF

Entry address:
0x9C40

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, 86, 94, FF, FF, E8, 8D, A6, FF, FF, E8, 1C, A9, FF, FF, E8, 53, C9, FF, FF, E8, 9A, C9, FF, FF, E8, C9, F2, FF, FF, E8, 30, F4, FF, FF, 33, C0, 55, 68, FC, A2, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, C5, A2, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 96, FE, FF, FF, E8, C9, FA, FF, FF, 8D, 55, F0, 33, C0, E8, 83, CF, FF, FF, 8B, 55, F0, B8, 24, CE, 40, 00, E8, 32, 95, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, 24, CE...
 
[+]

Entropy:
7.8581

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
37 KB (37,888 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to os.solvefile.com  (207.189.109.121:80)

TCP (HTTP):
Connects to cdnus.solvefile.com  (207.189.109.121:80)

Remove icreinstall_adobe_flash_setup.exe - Powered by Reason Core Security