skypemoticons.exe

Shlomo Dayan

This program bundles adware during the download and install process using the InstaleRex pay-per-install app monetizer. The application skypemoticons.exe, “Installer for WinterSoft” by Shlomo Dayan has been detected as adware by 30 anti-malware scanners. The program is a setup application that uses the WebPick InstalleRex (Tarma) installer. The setup program uses Web-Pick's InstalleRex download manager and installer to bundle potentially unwanted ad-supported software which includes toolbars and browser extensions through a pay-per-install monetization scheme.
Publisher:
WinterSoft  (signed by Shlomo Dayan)

Product:
WinterSoft

Description:
Installer for WinterSoft

Version:
2013.10.31.1157

MD5:
cca8d41081539dd0ec3972370b5c2659

SHA-1:
d48119de3168c545243da1ae4448d1aa4cc9e9b4

SHA-256:
586c88b3902bbe3410d8dd9f6739640a67ed59ead1554b3634ae9b43b270bfde

Scanner detections:
30 / 68

Status:
Adware

Explanation:
Uses the InstalleRex from WebPick Internet Holdings to install bundled add-ons including toolbars and other web browser extensions.

Analysis date:
4/25/2024 3:39:28 PM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.Downloader
7.1.1

AhnLab V3 Security
PUP/Win32.TSULoader
2014.09.21

Avira AntiVirus
Adware/InstallRex.P.2
7.11.143.102

avast!
Win32:InstalleRex-AH [PUP]
2014.9-140920

AVG
MalSign.Generic
2015.0.3345

Clam AntiVirus
Win.Trojan.Installerex-1
0.98/19406

Comodo Security
Application.Win32.InstalleRex.LL
18105

Dr.Web
Adware.Downware.1541
9.0.1.0263

ESET NOD32
Win32/InstalleRex
8.9675

Fortinet FortiGate
Riskware/InstalleRex
9/20/2014

F-Prot
W32/InstallRex.B
4.6.5.141

G Data
Win32.Application.InstalleRex
14.9.24

IKARUS anti.virus
AdWare.InstallRex
t3scan.1.6.1.0

K7 AntiVirus
Trojan
13.176.11755

Kaspersky
Trojan.Win32.AntiFW
14.0.0.3223

Malwarebytes
PUP.Optional.InstalleRex
v2014.09.20.12

McAfee
PUP-FHQ!EB13D2DD0FDC
5600.7001

NANO AntiVirus
Riskware.Win32.Downware.crdwjq
0.28.0.59048

nProtect
Trojan/W32.AntiFW.311464
14.09.19.01

Panda Antivirus
PUP/TSUploader
14.09.20.12

Qihoo 360 Security
Malware.QVM20.Gen
1.0.0.1015

Quick Heal
Trojan.AntiFW.A5
9.14.14.00

Reason Heuristics
Adware.WebPick.Installer.N
14.9.20.12

Rising Antivirus
PE:PUF.InstallRex!1.9E4C
23.00.65.14918

Sophos
InstallRex
4.98

SUPERAntiSpyware
Adware.InstalleRex/Variant
10348

Vba32 AntiVirus
Downloader.AdLoad
3.12.26.0

VIPRE Antivirus
Trojan.Win32.Generic
28214

Zillya! Antivirus
Downloader.Adload.Win32.16843
2.0.0.1928

File size:
304.2 KB (311,464 bytes)

Product version:
1.0.0.1

Copyright:
Copyright © 2013 WinterSoft

Original file name:
TSULoader.exe

File type:
Executable application (Win32 EXE)

Installer:
WebPick InstalleRex (Tarma)

Common path:
C:\users\{user}\downloads\skypemoticons.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
1/22/2013 1:00:00 AM

Valid to:
1/23/2014 12:59:59 AM

Subject:
CN=Shlomo Dayan, O=Shlomo Dayan, STREET=Smadar 45, L=Tel Aviv, S=center, PostalCode=67126, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
413C7D68ADD60589106BCF7DC596FBBA

File PE Metadata
Compilation timestamp:
3/12/2013 9:51:45 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
6144:Trkw6Y0JQBkQRl7174NpNUM+UHs+tPvpqvpQAy+L9hMk+W60z4RRWe:Trkw63yRl1uqM+gs+tPvEpPy+rMzue

Entry address:
0x14DB

Entry point:
55, 8B, EC, 81, EC, 2C, 06, 00, 00, 53, 56, 33, DB, 57, 66, 89, 9D, DC, FB, FF, FF, 89, 5D, F4, 89, 5D, FC, FF, 15, 74, 30, 40, 00, A3, 08, 44, 40, 00, FF, 15, 70, 30, 40, 00, 8B, F8, 8D, 45, EC, 50, FF, 15, 6C, 30, 40, 00, FF, 15, 68, 30, 40, 00, 8B, F0, F7, D6, 33, F7, FF, 15, 64, 30, 40, 00, 33, F0, 8B, 45, F0, 33, 45, EC, 68, 04, 01, 00, 00, 33, F0, 8D, 85, D4, F9, FF, FF, 50, 53, FF, 15, 60, 30, 40, 00, 85, C0, 75, 41, FF, 15, 5C, 30, 40, 00, 83, F8, 78, 75, 1A, 68, A8, 32, 40, 00, E8, 43, FB, FF, FF...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
7.5 KB (7,680 bytes)

The file skypemoticons.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to r1.stylezip.info  (54.186.255.26:80)

TCP (HTTP):
Connects to c1.stylezip.info  (54.186.255.26:80)

 
http://c1.stylezip.info/?step_id=1&installer_id=10545386&publisher_id=054&source_id=0&page_id=0&country_code=US&locale=US&browser_id=4&download_id=31636158&external_id=0&session_id=63272316&hardware_id=73817702&installer_file_name=skypemoticons

Remove skypemoticons.exe - Powered by Reason Core Security