icreinstall_bluestacks app player setup.exe

Galegi

Gasepi

The installer utilizes InstallCore which may bundle about 3-4 offers for various ad-supported toolbars, extensions and utilities. The application icreinstall_bluestacks app player setup.exe, “Galegi Setup ” has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the installCore installer, however the file is not signed with an authenticode signature from a trusted source. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions.
Publisher:
Gasepi

Product:
Galegi

Description:
Galegi Setup

MD5:
fa69558f3866603577037a6a62c7fdf9

SHA-1:
1528b48c2bb417d36c9f11c3defe208b7fdc1cd6

SHA-256:
48efac8290f370aa4a301eaae352e9204614c204e4496c1a9719b6fd4c9b1f0d

Scanner detections:
1 / 68

Status:
Potentially unwanted

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
6/16/2024 5:30:06 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.InstallCore.Gasepi.Installer.Meta (M)
16.3.24.20

File size:
1003.8 KB (1,027,909 bytes)

Product version:
5.8

Copyright:
Lite Internet

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\temp\icreinstall_bluestacks app player setup.exe

File PE Metadata
Compilation timestamp:
6/19/1992 5:22:17 PM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
24576:maxoz0ahG60bMpKJMuKnv3+jms2EdnOH5tgP0CzynE2T:m1wZb6KyvsVOZtreynE4

Entry address:
0x9C40

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, 86, 94, FF, FF, E8, 8D, A6, FF, FF, E8, 1C, A9, FF, FF, E8, 53, C9, FF, FF, E8, 9A, C9, FF, FF, E8, C9, F2, FF, FF, E8, 30, F4, FF, FF, 33, C0, 55, 68, FC, A2, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, C5, A2, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 96, FE, FF, FF, E8, C9, FA, FF, FF, 8D, 55, F0, 33, C0, E8, 83, CF, FF, FF, 8B, 55, F0, B8, 24, CE, 40, 00, E8, 32, 95, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, 24, CE...
 
[+]

Entropy:
7.9097

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
37 KB (37,888 bytes)

The file icreinstall_bluestacks app player setup.exe has been seen being distributed by the following 7 URLs.

http://www.downloadsbundlebyte.com/c?x=Ev2Bwnu4LgracI3dai2vn7gdGJ/jnHE10Og7QK8PfAE=&c=UZ/lXUmOUVLdsouWm8QSAF3Sxfvew5N1ycQYRqnxISeoqYAep55UHP UX65jsAFdWmo332A1qyEKm WuKC3B 4TZSn1y3Ra cyuxHR4ZddFzRBLFW9EBYkYWcgaUEQBQOw5kH0PWC6c4/a5Hfgx4Anqh2cD2ga8EUYR4iTijVaoX1RFGrXW8ceWaxdkp8Y3B&e=0&downloadAs=BlueStacks App Player Setup.exe&fallback_url=http://www.downloadfree9.com/landers/.../download.php

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to os.solvefile.com  (207.189.109.121:80)

TCP (HTTP):
Connects to cdnus.solvefile.com  (207.189.109.121:80)

TCP (HTTP):
Connects to cdneu.webfilescdn.com  (65.254.40.36:80)

Remove icreinstall_bluestacks app player setup.exe - Powered by Reason Core Security