icreinstall_freeocrtoword.exe

TechEvolve GMBH

The installer utilizes InstallCore which may bundle about 3-4 offers for various ad-supported toolbars, extensions and utilities. The application icreinstall_freeocrtoword.exe by TechEvolve GMBH has been detected as a potentially unwanted program by 10 anti-malware scanners. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. The file has been seen being downloaded from www.ocrtoword.com. While running, it connects to the Internet address os.solvefile.com on port 80 using the HTTP protocol.
Publisher:
TechEvolve GMBH  (signed and verified)

MD5:
0eed02afe53e4e8ad7e9889812e3633b

SHA-1:
d28f18efa3320f968aef221bcbb9f63cbfc2f1e2

SHA-256:
1fdbc2c9ab3cd43626c677662d94e60cfd12e3dd95dc32907528eabe8a7d1612

Scanner detections:
10 / 68

Status:
Potentially unwanted

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
11/15/2024 11:20:51 PM UTC  (a few moments ago)

Scan engine
Detection
Engine version

Avira AntiVirus
7.11.169.54

ESET NOD32
Win32/InstallCore.QL (variant)
8.10311

Fortinet FortiGate
Riskware/InstallCore
8/26/2014

F-Prot
W32/InstallCore.AC.gen
v6.4.7.1.166

Malwarebytes
PUP.Optional.Amonetize
v2014.08.26.12

Reason Heuristics
PUP.Optional.TechEvolveGMBH.Z
14.8.26.0

Sophos
Generic PUA NC
4.98

SUPERAntiSpyware
10399

Trend Micro House Call
Suspicious_GEN.F47V0821
7.2.238

VIPRE Antivirus
InstallCore
32530

File size:
667.3 KB (683,320 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\temp\icreinstall_freeocrtoword.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
12/16/2012 1:00:00 AM

Valid to:
12/17/2015 12:59:59 AM

Subject:
CN=TechEvolve GMBH, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=TechEvolve GMBH, L=Beijing, S=Beijing, C=CN

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
50FF3D5C361AE9F52E4B0A3CF576C6EE

File PE Metadata
Compilation timestamp:
6/20/1992 12:22:17 AM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:nNvp+A20jyv+/x+unkCxlozZ6gvJS1gXr2upAV+POzD2m7XE01Up:nNvMo75+unkCDoRR97k+WzSm7x1u

Entry address:
0x9C40

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, 86, 94, FF, FF, E8, 8D, A6, FF, FF, E8, 1C, A9, FF, FF, E8, 53, C9, FF, FF, E8, 9A, C9, FF, FF, E8, C9, F2, FF, FF, E8, 30, F4, FF, FF, 33, C0, 55, 68, FC, A2, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, C5, A2, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 96, FE, FF, FF, E8, C9, FA, FF, FF, 8D, 55, F0, 33, C0, E8, 83, CF, FF, FF, 8B, 55, F0, B8, 24, CE, 40, 00, E8, 32, 95, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, 24, CE...
 
[+]

Entropy:
7.8876

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
37 KB (37,888 bytes)

The file icreinstall_freeocrtoword.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to os.solvefile.com  (207.189.109.121:80)

TCP (HTTP):
Connects to cdnus.solvefile.com  (207.189.109.121:80)

Remove icreinstall_freeocrtoword.exe - Powered by Reason Core Security