wconnectordirect.exe

AsyncSystemSockets

First Offer LTD

The is the installer for the WebPick InstalleRex download manager which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed without consent. The application wconnectordirect.exe by First Offer has been detected as adware by 3 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler named SystemSockets triggered to execute each time a user logs in. It uses Web-Pick's InstalleRex download manager and installer to bundle potentially unwanted ad-supported software which includes toolbars and browser extensions through a pay-per-install monetization scheme.
Publisher:
First Offer LTD  (signed and verified)

Product:
AsyncSystemSockets

Version:
1.0.0.0

MD5:
0addfeeedd776940cff227937a1e6ed0

SHA-1:
170e2669b8ff00e3c3d93ef2180843d429444b89

SHA-256:
fbffbb1df549fe34b0755e5f3e1a11e952f2a390e1ddf8e5f1c7df334ecf043a

Scanner detections:
3 / 68

Status:
Adware

Explanation:
Uses the InstalleRex from WebPick Internet Holdings to install bundled add-ons including toolbars and other web browser extensions.

Analysis date:
4/23/2024 6:22:05 AM UTC  (today)

Scan engine
Detection
Engine version

avast!
Win32:InstalleRex-BF [PUP]
2014.9-141101

AVG
Generic
2015.0.3304

Reason Heuristics
PUP.Task.FirstOffer.Q
14.11.1.8

File size:
33.6 KB (34,376 bytes)

Product version:
1.0.0.0

Copyright:
Copyright © 2014

Original file name:
SystemSockets.exe

File type:
Executable application (Win32 EXE)

Language:
Swedish (Sweden)

Common path:
C:\Program Files\pricecongress\wconnectordirect.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
10/8/2013 2:00:00 AM

Valid to:
10/9/2014 1:59:59 AM

Subject:
CN=First Offer LTD, O=First Offer LTD, STREET=Habarzel 21 Tel Aviv, L=Tel aviv, S=Israel, PostalCode=69710, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
49900242461D96CB7B045BE0A258338E

File PE Metadata
Compilation timestamp:
1/9/2014 5:16:17 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
768:UYQFXw5fF/nVfZgn7FoK4mLGCkb/rS/UyAFExhcv:eu5fF/nTI7Fo1mL+bTKY4hcv

Entry address:
0x837E

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
25 KB (25,600 bytes)

Scheduled Task
Task name:
SystemSockets

Path:
\SystemSockets\SystemSockets

Trigger:
Logon (Runs on logon)


Remove wconnectordirect.exe - Powered by Reason Core Security