les nymphos font.exe

Sergey Petrov

This is a WebPick installer that bundles (with very minimal user consent) a number of adware browser extensions which inject ads in the browser. The application les nymphos font.exe, “Installer for AppReady Software” by Sergey Petrov has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the WebPick InstalleRex (Tarma) installer. The file has been seen being downloaded from styleapplicationzillion.com. While running, it connects to the Internet address r1.stylezip.info on port 80 using the HTTP protocol.
Publisher:
AppReady Software  (signed by Sergey Petrov)

Product:
AppReady Software

Description:
Installer for AppReady Software

Version:
2014.5.4.1639

MD5:
f3cc57df90421c8f681f64c67d6f0d1e

SHA-1:
de01effd83d5fb04094020d4f4c67d5723d40df3

SHA-256:
cf3aea1c146fd6961ad587ac7cd47be0b8543980cd9c2594b89cedfcdc502652

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Uses Web-Pick's 'File Product', an Installer which wraps various products and downloads and installs it silently through the process, hosted on TusFiles.

Analysis date:
4/24/2024 9:22:42 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Adware.WebPick.Installer (M)
16.1.15.1

File size:
316.1 KB (323,704 bytes)

Product version:
1.0.0.3

Copyright:
Copyright © 2014 AppReady Software

Original file name:
TSULoader.exe

File type:
Executable application (Win32 EXE)

Installer:
WebPick InstalleRex (Tarma)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\les nymphos font.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
8/21/2013 2:00:00 AM

Valid to:
8/22/2014 1:59:59 AM

Subject:
CN=Sergey Petrov, O=Sergey Petrov, STREET=Gaydara 13, L=Kyev, S=Kyev, PostalCode=01033, C=UA

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
0AD084E865D27CD546D21DB6EDF89D48

File PE Metadata
Compilation timestamp:
3/12/2013 9:51:45 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
6144:Ar6bUzkuvcBYC47l2xvr8B113MzGl+DfOsLkwlOIdWq2sP:ArjkuveY37D3h8fO+sIdWq2w

Entry address:
0x14DB

Entry point:
55, 8B, EC, 81, EC, 2C, 06, 00, 00, 53, 56, 33, DB, 57, 66, 89, 9D, DC, FB, FF, FF, 89, 5D, F4, 89, 5D, FC, FF, 15, 74, 30, 40, 00, A3, 08, 44, 40, 00, FF, 15, 70, 30, 40, 00, 8B, F8, 8D, 45, EC, 50, FF, 15, 6C, 30, 40, 00, FF, 15, 68, 30, 40, 00, 8B, F0, F7, D6, 33, F7, FF, 15, 64, 30, 40, 00, 33, F0, 8B, 45, F0, 33, 45, EC, 68, 04, 01, 00, 00, 33, F0, 8D, 85, D4, F9, FF, FF, 50, 53, FF, 15, 60, 30, 40, 00, 85, C0, 75, 41, FF, 15, 5C, 30, 40, 00, 83, F8, 78, 75, 1A, 68, A8, 32, 40, 00, E8, 43, FB, FF, FF...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
7.5 KB (7,680 bytes)

The file les nymphos font.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to r1.stylezip.info  (54.186.255.26:80)

Remove les nymphos font.exe - Powered by Reason Core Security