cr_downloader_for_spyro-the-dragon.exe

Artur Kozak

The installer which is distributed via file sharing sites such as TusFiles uses the 'download manager' which wraps the original file in a adware filled bundle. The application cr_downloader_for_spyro-the-dragon.exe, “Installer for QuickSet” by Artur Kozak has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the WebPick InstalleRex (Tarma) installer. While running, it connects to the Internet address r1.getapplicationmy.info on port 80 using the HTTP protocol.
Publisher:
QuickSet  (signed by Artur Kozak)

Product:
QuickSet

Description:
Installer for QuickSet

Version:
2013.11.20.1838

MD5:
a8455794da64bf8923bcf79b7af19e83

SHA-1:
ec17fb67679459d2b0408294603a38578bbde071

SHA-256:
8d38f822d093c2b88c6a7d94059fb1ffb221e0b0e2582105d545644902fe0732

Scanner detections:
1 / 68

Status:
Adware

Explanation:
This bunder users the InstalleRex from WebPick Internet Holdings to install add-ons such as web browser extensions, coupon plugins (WebSave) and toolbars distributed via the tusfiles.net download site.

Analysis date:
12/25/2024 12:04:14 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Adware (M)
17.3.15.22

File size:
314.6 KB (322,168 bytes)

Product version:
1.0.0.1

Copyright:
Copyright © 2013 QuickSet

Original file name:
TSULoader.exe

File type:
Executable application (Win32 EXE)

Installer:
WebPick InstalleRex (Tarma)

Common path:
C:\users\{user}\downloads\cr_downloader_for_spyro-the-dragon.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
8/21/2013 9:00:00 PM

Valid to:
8/22/2014 8:59:59 PM

Subject:
CN=Artur Kozak, O=Artur Kozak, STREET=Parkovaya 19, L=Kyiv, S=Kyiv, PostalCode=04078, C=UA

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00E03731FB48F020DDF5953B6498B83BC6

File PE Metadata
Compilation timestamp:
10/29/2013 4:49:54 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

Entry address:
0x1495

Entry point:
55, 8B, EC, 81, EC, 2C, 06, 00, 00, 53, 56, 33, DB, 57, 66, 89, 9D, DC, FB, FF, FF, 89, 5D, F4, 89, 5D, FC, FF, 15, 68, 30, 40, 00, 8B, F8, 8D, 45, EC, 50, FF, 15, 64, 30, 40, 00, FF, 15, 60, 30, 40, 00, 8B, F0, F7, D6, 33, F7, FF, 15, 5C, 30, 40, 00, 33, F0, 8B, 45, F0, 33, 45, EC, 68, 04, 01, 00, 00, 33, F0, 8D, 85, D4, F9, FF, FF, 50, 53, FF, 15, 58, 30, 40, 00, 85, C0, 75, 41, FF, 15, 54, 30, 40, 00, 83, F8, 78, 75, 1A, 68, A4, 32, 40, 00, E8, 4E, FB, FF, FF, 59, C7, 05, 08, 44, 40, 00, FD, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
7.5 KB (7,680 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to r1.getapplicationmy.info  (54.201.215.30:80)

TCP (HTTP):
Connects to c1.getapplicationmy.info  (54.201.215.30:80)

 
http://c1.getapplicationmy.info/?step_id=1&installer_id=634194131&publisher_id=341&source_id=0&page_id=0&affiliate_id=0&country_code=ES&locale=EN&browser_id=2&download_id=634794136&external_id=634224221

Remove cr_downloader_for_spyro-the-dragon.exe - Powered by Reason Core Security