icreinstall_wifi_hopper_en.exe

Webcellence Ltd.

The installer utilizes InstallCore which may bundle about 3-4 offers for various ad-supported toolbars, extensions and utilities. The application icreinstall_wifi_hopper_en.exe by Webcellence has been detected as adware by 18 anti-malware scanners. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. It is also typically executed from the user's temporary directory. While running, it connects to the Internet address os.solvefile.com on port 80 using the HTTP protocol.
Publisher:
Webcellence Ltd.  (signed and verified)

MD5:
de092fa69eb97f5dfc8f1b5c1622cddd

SHA-1:
7c4592565e9492dfbf0040f8a6493fa318b9bdc0

SHA-256:
85244333b26a7d39dc826183d4209cd91bb7dd27b8ec53fe62c4e4f84130fd89

Scanner detections:
18 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
4/27/2024 10:44:14 PM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
7.11.125.192

Bitdefender
Gen:Variant.Strictor.48839
1.0.20.95

Comodo Security
Application.Win32.InstallCore.KAT
17640

Dr.Web
Trojan.Packed.24524
9.0.1.019

Emsisoft Anti-Malware
Gen:Variant.Strictor.48839
8.14.01.19.02

ESET NOD32
Win32/InstallCore.FJ (variant)
8.9310

F-Prot
W32/InstallCore.R.gen
v6.4.7.1.166

F-Secure
Gen:Variant.Strictor.48839
11.2014-19-01_1

G Data
Gen:Variant.Strictor.48839
14.1.24

Malwarebytes
v2014.01.19.02

MicroWorld eScan
Gen:Variant.Strictor.48839
15.0.0.57

Reason Heuristics
PUP.Webcellence.AA
14.8.7.20

Rising Antivirus
PE:Malware.XPACK-LNR/Heur!1.5594
23.00.65.14117

SUPERAntiSpyware
10836

Vba32 AntiVirus
3.12.24.3

VIPRE Antivirus
Trojan.Win32.Generic
25584

File size:
665.5 KB (681,456 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Common path:
C:\users\{user}\appdata\local\temp\icreinstall_wifi_hopper_en.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
3/5/2013 1:00:00 AM

Valid to:
5/5/2014 1:59:59 AM

Subject:
CN=Webcellence Ltd., OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Webcellence Ltd., L=Moshav Ora, S=Israel, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
2742F1242826FB7F69B052B7F394DFED

File PE Metadata
Compilation timestamp:
6/20/1992 12:22:17 AM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:YfyMJfsGWgRKsZprsYnHLih4YxcIx03QgvCbvIJmRpkDiDzhD/jrUS0L/eo:YfyMJfslgRKsZ8ThBpDNcD0lboSAeo

Entry address:
0x98CC

Entry point:
55, 8B, EC, 83, C4, CC, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, FA, 97, FF, FF, E8, 01, AA, FF, FF, E8, 2C, CC, FF, FF, E8, 73, CC, FF, FF, E8, 0A, F3, FF, FF, E8, 71, F4, FF, FF, 33, C0, 55, 68, 76, 9F, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, 2C, 9F, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, B0, 40, 00, E8, 9B, FE, FF, FF, E8, 26, FA, FF, FF, 8D, 55, F0, 33, C0, E8, E0, D0, FF, FF, 8B, 55, F0, B8, D8, BD, 40, 00, E8, AB, 98, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, D8, BD, 40, 00, B2, 01, B8...
 
[+]

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
36 KB (36,864 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to os.solvefile.com  (207.189.109.121:80)

TCP (HTTP):
Connects to cdnus.solvefile.com  (207.189.109.121:80)

Remove icreinstall_wifi_hopper_en.exe - Powered by Reason Core Security