popcom.exe

Installmatic, LLC

This is part of the Installmatic installer which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application popcom.exe by Installmatic has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Installmatic Setup installer. This executable runs as a local area network (LAN) Internet proxy server listening on port 49289 and has the ability to intercept and modify all inbound and outbound Internet traffic on the local host.
Publisher:
PopCom  (signed by Installmatic, LLC)

Product:
PopCom

Version:
1.0.3.0

MD5:
9eaa7da2439770af9074b9cff4e2ec22

SHA-1:
4a7deb1e015ba0005ed77b2e9938d0ffd67d34b2

SHA-256:
7ba7314946d82276b7b2b9f558f60c4f966bb0589289801034db84104aa10a31

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
5/17/2024 5:25:34 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Installmatic.PopCom (M)
15.8.21.23

File size:
480.6 KB (492,096 bytes)

Product version:
1.0.3.0

Copyright:
Copyright © 2015

Original file name:
popcom3.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Installmatic Setup

Language:
Language Neutral

Common path:
C:\Program Files\popcom\popcom.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
7/22/2015 9:00:00 PM

Valid to:
7/22/2016 8:59:59 PM

Subject:
CN="Installmatic, LLC", O="Installmatic, LLC", STREET="80 SW 8th St #2000", L=Miami, S=FL, PostalCode=33130, C=US

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
2D13291AEE51B2226F83396FCD33C1F1

File PE Metadata
Compilation timestamp:
8/20/2015 7:11:35 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
12288:1TmRb6Blp9j0J1/k8qwJL9K1TgX9dLZ2t4QKEKd4Q1iNL04ess:1T4Gh90J1VqwJB+TWl2yl

Entry address:
0x7E00A

Entry point:
FF, 25, 00, E0, 47, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Code size:
84 KB (86,016 bytes)

Local Proxy Server
Proxy for:
Internet Settings

Local host address:
http://127.0.0.1:49289/

Local host port:
49289

Default credentials:
No


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ec2-52-15-56-242.us-east-2.compute.amazonaws.com  (52.15.56.242:80)

TCP (HTTP):
Connects to rtas-s2s-21.btrll.com  (162.208.22.34:80)

TCP (HTTP):
Connects to ml.pamela  (45.55.139.102:80)

TCP (HTTP SSL):
Connects to ec2-52-73-109-231.compute-1.amazonaws.com  (52.73.109.231:443)

TCP (HTTP):
Connects to tg2-den.search.spotxchange.com  (198.54.12.97:80)

TCP (HTTP):
Connects to server-52-85-107-31.jax1.r.cloudfront.net  (52.85.107.31:80)

TCP (HTTP):
Connects to ec2-52-15-103-148.us-east-2.compute.amazonaws.com  (52.15.103.148:80)

TCP (HTTP SSL):
Connects to edge-star-shv-01-gru2.facebook.com  (31.13.85.8:443)

TCP (HTTP):
Connects to ec2-54-243-128-145.compute-1.amazonaws.com  (54.243.128.145:80)

TCP (HTTP):
Connects to ec2-54-183-252-153.us-west-1.compute.amazonaws.com  (54.183.252.153:80)

TCP (HTTP):
Connects to ec2-52-9-197-149.us-west-1.compute.amazonaws.com  (52.9.197.149:80)

TCP (HTTP):
Connects to server-52-85-107-223.jax1.r.cloudfront.net  (52.85.107.223:80)

TCP (HTTP):
Connects to li1475-56.members.linode.com  (139.162.62.56:80)

TCP (HTTP):
Connects to l3dsr-cserv-um-21.iad3.btrll.com  (162.208.22.39:80)

TCP (HTTP SSL):
Connects to edge-star-mini-shv-01-gru2.facebook.com  (31.13.85.36:443)

TCP (HTTP):
Connects to ec2-54-84-70-142.compute-1.amazonaws.com  (54.84.70.142:80)

TCP (HTTP):
Connects to ec2-54-235-182-183.compute-1.amazonaws.com  (54.235.182.183:80)

TCP (HTTP):
Connects to ec2-54-221-252-20.compute-1.amazonaws.com  (54.221.252.20:80)

TCP (HTTP):
Connects to ec2-54-165-125-146.compute-1.amazonaws.com  (54.165.125.146:80)

TCP (HTTP):
Connects to ec2-52-9-64-251.us-west-1.compute.amazonaws.com  (52.9.64.251:80)

Remove popcom.exe - Powered by Reason Core Security