SimpleFiles.exe

SimpleFiles Application

Blisbury LLP

The application SimpleFiles.exe by Blisbury LLP has been detected as a potentially unwanted program by 2 anti-malware scanners. The program is a setup application that uses the SimpleFiles installer. While running, it connects to the Internet address ocsp.comodoca.com on port 80 using the HTTP protocol.
Publisher:
http://simple-files.com/  (signed by Blisbury LLP)

Product:
SimpleFiles Application

Version:
3, 0, 0, 1

MD5:
ed7433851022348a246b3b835bf010ec

SHA-1:
162fb9e077a26b54288e455cb42429e2e2f1a1f9

SHA-256:
65e95689e3b0cf48667f760fcd0b3daa85f7c7715c56ca4f7ccb132e4c878595

Scanner detections:
2 / 68

Status:
Potentially unwanted

Description:
This is an installer which may bundle legitimate applications with offers for additional 3rd-party applications that may be unwanted by the user. While the installer contains an 'opt-out' feature this is not set be defult and is usually overlooked.

Analysis date:
5/1/2024 2:22:27 AM UTC  (today)

Scan engine
Detection
Engine version

AVG
Generic
2015.0.3330

Reason Heuristics
PUP.BlisburyLLP.L
14.10.5.16

File size:
2.3 MB (2,410,552 bytes)

Product version:
3,0,0,0

Copyright:
Copyright http://simple-files.com/ (C) 2013

Original file name:
SimpleFiles.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
SimpleFiles

Language:
English (United States)

Common path:
C:\Program Files\simplefiles\simplefiles.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
6/12/2013 5:00:00 PM

Valid to:
6/12/2016 4:59:59 PM

Subject:
CN=Blisbury LLP, O=Blisbury LLP, STREET=Suite 3.15, STREET=One Fetter Lane, L=London, S=London, PostalCode=EC4A 1BR, C=GB

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
3A064626CE173599127D78C730697B78

File PE Metadata
Compilation timestamp:
8/1/2014 1:45:58 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
49152:6Wr9stTqZZfc2C6VGhtRwVLIqhm7z8C7W:kpASS

Entry address:
0x29FFD

Entry point:
E8, 4E, D3, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, D0, FB, 45, 00, E8, DD, 34, 00, 00, E8, D0, 23, 00, 00, 0F, B7, F0, 6A, 02, E8, E1, D2, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, 1F, 9B, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Code size:
289 KB (295,936 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-230-52-169.jfk6.r.cloudfront.net  (54.230.52.169:80)

TCP (HTTP SSL):
Connects to server-54-192-52-26.jfk6.r.cloudfront.net  (54.192.52.26:443)

TCP (HTTP SSL):
Connects to ord30s21-in-f74.1e100.net  (216.58.216.74:443)

TCP (HTTP):
Connects to ocsp.comodoca.com  (178.255.83.1:80)

TCP (HTTP):
Connects to a23-52-149-163.deploy.static.akamaitechnologies.com  (23.52.149.163:80)

TCP (HTTP):

TCP (HTTP):
Connects to a1plpkivs-v03.any.prod.ash1.secureserver.net  (72.167.239.239:80)

TCP (HTTP):
Connects to a173-223-204-8.deploy.static.akamaitechnologies.com  (173.223.204.8:80)

TCP (HTTP):
Connects to 23.190.211.130.bc.googleusercontent.com  (130.211.190.23:80)

Remove SimpleFiles.exe - Powered by Reason Core Security