minecraftdl_44602.exe

Artur Kozak

The installer which is distributed via file sharing sites such as TusFiles uses the 'download manager' which wraps the original file in a adware filled bundle. The application minecraftdl_44602.exe, “Installer for QuickSet” by Artur Kozak has been detected as adware by 34 anti-malware scanners. The program is a setup application that uses the WebPick InstalleRex (Tarma) installer. The setup program uses Web-Pick's InstalleRex download manager and installer to bundle potentially unwanted ad-supported software which includes toolbars and browser extensions through a pay-per-install monetization scheme.
Publisher:
QuickSet  (signed by Artur Kozak)

Product:
QuickSet

Description:
Installer for QuickSet

Version:
2013.11.20.1837

MD5:
794dc7b4bc58ca4240a1e5d025cb4c1c

SHA-1:
61e40b76274bcd5339352af7e1d3ecd4f8ff5787

SHA-256:
0fb6a55536959b284673c2c67186d021d886995ae8f714ac8f562c5f884e63ba

Scanner detections:
34 / 68

Status:
Adware

Explanation:
This bunder users the InstalleRex from WebPick Internet Holdings to install add-ons such as web browser extensions, coupon plugins (WebSave) and toolbars distributed via the tusfiles.net download site.

Analysis date:
4/26/2024 3:13:09 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.Generic.10213271
688

Agnitum Outpost
PUA.Downloader
7.1.1

AhnLab V3 Security
PUP/Win32.TSULoader
2015.03.19

Avira AntiVirus
Adware/InstallRex.Q
7.11.218.100

avast!
Win32:InstalleRex-AR [PUP]
2014.9-150318

AVG
InstallRex.7cb
2016.0.3166

Bitdefender
Trojan.Generic.10213271
1.0.20.385

Bkav FE
W32.FamVT.AntiFWK.Trojan
1.3.0.6379

Clam AntiVirus
Win.Adware.Installerex-2
0.98/20205

Comodo Security
Application.Win32.InstalleRex.KG
21455

Dr.Web
Adware.Downware.1719
9.0.1.05190

Emsisoft Anti-Malware
Trojan.Generic.10213271
8.15.03.18.07

ESET NOD32
Win32/InstalleRex.L potentially unwanted application
7.0.302.0

Fortinet FortiGate
Riskware/InstalleRex
3/18/2015

F-Prot
W32/InstallRex.B
4.6.5.141

F-Secure
Riskware.Gen:Variant.Application.Bundler
5.13.68

G Data
Gen:Variant.Application.Bundler.InstallRex
15.3.25

herdProtect (fuzzy)
2015.6.24.14

IKARUS anti.virus
PUA.TDownloader
t3scan.1.8.6.0

K7 AntiVirus
Unwanted-Program
13.201.15304

Kaspersky
not-a-virus:Downloader.Win32.AdLoad
14.0.0.2326

Malwarebytes
PUP.Optional.InstalleRex
v2015.03.18.08

McAfee
PUP-FFQ!304C1765A86C
5600.6822

MicroWorld eScan
Trojan.Generic.10213271
16.0.0.231

NANO AntiVirus
Riskware.Win32.Downware.cscobj
0.28.0.57029

nProtect
Backdoor/W32.Clack.320696
14.01.10.01

Quick Heal
Trojan.AntiFW.A5
3.15.14.00

Reason Heuristics
Adware.WebPick.Installer
15.3.18.20

Rising Antivirus
PE:Trojan.DL.Win32.AntiFW.a!1075355932
23.00.65.15316

Sophos
PUA 'InstallRex'
5.12

SUPERAntiSpyware
Adware.InstalleRex/Variant
9989

Vba32 AntiVirus
AdWare.Agent
3.12.26.3

VIPRE Antivirus
Threat.4150696
37788

Zillya! Antivirus
Downloader.Adload.Win32.16871
2.0.0.2105

File size:
305.2 KB (312,496 bytes)

Product version:
1.0.0.1

Copyright:
Copyright © 2013 QuickSet

Original file name:
TSULoader.exe

File type:
Executable application (Win32 EXE)

Installer:
WebPick InstalleRex (Tarma)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\minecraftdl_44602.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
8/21/2013 7:00:00 PM

Valid to:
8/22/2014 6:59:59 PM

Subject:
CN=Artur Kozak, O=Artur Kozak, STREET=Parkovaya 19, L=Kyiv, S=Kyiv, PostalCode=04078, C=UA

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00E03731FB48F020DDF5953B6498B83BC6

File PE Metadata
Compilation timestamp:
3/12/2013 3:51:45 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
6144:Prkx9uEo2S1YnQmCX492DkwNP3qpYFkXdlP5IO5/OoCVHuy6SHZ86riVZkiizIb:PrkHu6/eIo4RXdrIO5/OpVHd6Ky6rizL

Entry address:
0x14DB

Entry point:
55, 8B, EC, 81, EC, 2C, 06, 00, 00, 53, 56, 33, DB, 57, 66, 89, 9D, DC, FB, FF, FF, 89, 5D, F4, 89, 5D, FC, FF, 15, 74, 30, 40, 00, A3, 08, 44, 40, 00, FF, 15, 70, 30, 40, 00, 8B, F8, 8D, 45, EC, 50, FF, 15, 6C, 30, 40, 00, FF, 15, 68, 30, 40, 00, 8B, F0, F7, D6, 33, F7, FF, 15, 64, 30, 40, 00, 33, F0, 8B, 45, F0, 33, 45, EC, 68, 04, 01, 00, 00, 33, F0, 8D, 85, D4, F9, FF, FF, 50, 53, FF, 15, 60, 30, 40, 00, 85, C0, 75, 41, FF, 15, 5C, 30, 40, 00, 83, F8, 78, 75, 1A, 68, A8, 32, 40, 00, E8, 43, FB, FF, FF...
 
[+]

Entropy:
7.9570

Developed / compiled with:
Microsoft Visual C++

Code size:
7.5 KB (7,680 bytes)

The file minecraftdl_44602.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to r1.getapplicationmy.info  (54.201.215.30:80)

TCP (HTTP):
Connects to c1.getapplicationmy.info  (54.201.215.30:80)

 
http://c1.getapplicationmy.info/?step_id=1&installer_id=19197636&publisher_id=917&source_id=0&page_id=0&affiliate_id=0&country_code=ES&locale=EN&browser_id=2&download_id=19797641&external_id=19227726

Remove minecraftdl_44602.exe - Powered by Reason Core Security