skypemoticons.exe

Shlomo Dayan

This program bundles adware during the download and install process using the InstaleRex pay-per-install app monetizer. The application skypemoticons.exe, “Installer for WinterSoft” by Shlomo Dayan has been detected as adware by 6 anti-malware scanners. The program is a setup application that uses the WebPick InstalleRex (Tarma) installer. The setup program uses Web-Pick's InstalleRex download manager and installer to bundle potentially unwanted ad-supported software which includes toolbars and browser extensions through a pay-per-install monetization scheme.
Publisher:
WinterSoft  (signed by Shlomo Dayan)

Product:
WinterSoft

Description:
Installer for WinterSoft

Version:
2013.10.21.1806

MD5:
3c8581b4b13c3de0ce4f7340b9c4146e

SHA-1:
8ec7f7ef27fd7f2424f6ef989d359b5545037a8e

SHA-256:
9f258943ffdc07e1be72b8018eb178a77834b72297c7db0626577b5e37b3b0b3

Scanner detections:
6 / 68

Status:
Adware

Explanation:
Uses the InstalleRex from WebPick Internet Holdings to install bundled add-ons including toolbars and other web browser extensions.

Analysis date:
4/19/2024 5:26:01 PM UTC  (today)

Scan engine
Detection
Engine version

avast!
Win32:InstalleRex-W [PUP]
141119-1

Dr.Web
Adware.Downware.1541
9.0.1.05190

ESET NOD32
Win32/InstalleRex.L potentially unwanted application
7.0.302.0

Kaspersky
Trojan.Win32.AntiFW
15.0.0.543

Reason Heuristics
Adware.WebPick.Installer.N
14.11.28.9

VIPRE Antivirus
Threat.4150696
35088

File size:
303.7 KB (310,960 bytes)

Product version:
1.0.0.1

Copyright:
Copyright © 2013 WinterSoft

Original file name:
TSULoader.exe

File type:
Executable application (Win32 EXE)

Installer:
WebPick InstalleRex (Tarma)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\skypemoticons.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
1/21/2013 7:00:00 PM

Valid to:
1/22/2014 6:59:59 PM

Subject:
CN=Shlomo Dayan, O=Shlomo Dayan, STREET=Smadar 45, L=Tel Aviv, S=center, PostalCode=67126, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
413C7D68ADD60589106BCF7DC596FBBA

File PE Metadata
Compilation timestamp:
3/12/2013 3:51:45 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
6144:9rkX6Y0JQBkQRl7174NpNUM+UHs+h43nRLFJO2t3OEhLSMwcU9P4WbXQx7a:9rkX63yRl1uqM+gs+2RLTf+QLShvQx7a

Entry address:
0x14DB

Entry point:
55, 8B, EC, 81, EC, 2C, 06, 00, 00, 53, 56, 33, DB, 57, 66, 89, 9D, DC, FB, FF, FF, 89, 5D, F4, 89, 5D, FC, FF, 15, 74, 30, 40, 00, A3, 08, 44, 40, 00, FF, 15, 70, 30, 40, 00, 8B, F8, 8D, 45, EC, 50, FF, 15, 6C, 30, 40, 00, FF, 15, 68, 30, 40, 00, 8B, F0, F7, D6, 33, F7, FF, 15, 64, 30, 40, 00, 33, F0, 8B, 45, F0, 33, 45, EC, 68, 04, 01, 00, 00, 33, F0, 8D, 85, D4, F9, FF, FF, 50, 53, FF, 15, 60, 30, 40, 00, 85, C0, 75, 41, FF, 15, 5C, 30, 40, 00, 83, F8, 78, 75, 1A, 68, A8, 32, 40, 00, E8, 43, FB, FF, FF...
 
[+]

Entropy:
7.9598

Developed / compiled with:
Microsoft Visual C++

Code size:
7.5 KB (7,680 bytes)

The file skypemoticons.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to r1.stylezip.info  (54.186.255.26:80)

Remove skypemoticons.exe - Powered by Reason Core Security