icreinstall_installer_microsoft_word_french.exe

ISfreemium

The installer utilizes InstallCore which may bundle about 3-4 offers for various ad-supported toolbars, extensions and utilities. The application icreinstall_installer_microsoft_word_french.exe by ISfreemium has been detected as adware by 25 anti-malware scanners. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. It is also typically executed from the user's temporary directory. The file has been seen being downloaded from telechargerstop.com. While running, it connects to the Internet address os.solvefile.com on port 80 using the HTTP protocol.
Publisher:
ISfreemium  (signed and verified)

MD5:
22b5cba20a592de948dad2f0e3cf6533

SHA-1:
656eae55c529091a698d4fda14c523e97372a79c

SHA-256:
be56a953bb40950ebba260cff73009eb1a1c17b8ffdfa6baf1368edd209888a8

Scanner detections:
25 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/25/2024 3:51:05 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.InstallCore
7.1.1

Avira AntiVirus
7.11.125.202

avast!
Win32:Adware-gen [Adw]
2014.9-140827

AVG
Adware InstallCore
2015.0.3369

Bkav FE
W32.Clod58a.Trojan
1.3.0.4613

Comodo Security
Application.Win32.Installcore.B
17642

Dr.Web
Trojan.Packed.24524
9.0.1.0239

ESET NOD32
Win32/InstallCore.CX (variant)
8.9310

Fortinet FortiGate
Riskware/InstallCore
8/27/2014

F-Prot
W32/A-42c63c6c
v6.4.7.1.166

G Data
Win32.Application.InstallCore
14.8.22

K7 AntiVirus
Unwanted-Program
13.174.10623

Malwarebytes
PUP.Optional.Freemium.A
v2014.08.27.02

McAfee
Artemis!22B5CBA20A59
5600.7025

NANO AntiVirus
Riskware.Win32.InstallCore.dcuobo
0.28.2.60990

Panda Antivirus
PUP/MultiToolbar.A
14.08.27.02

Qihoo 360 Security
HEUR/Malware.QVM20.Gen
1.0.0.1015

Reason Heuristics
PUP.ISfreemium.l
14.8.27.14

Rising Antivirus
PE:Malware.XPACK-LNR/Heur!1.5594
23.00.65.14825

SUPERAntiSpyware
10396

Trend Micro House Call
TROJ_GEN.F47V0117
7.2.239

Vba32 AntiVirus
3.12.24.3

VIPRE Antivirus
InstallCore
25606

XVirus List
Win32.Detected
2.8.7

File size:
681.8 KB (698,144 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Common path:
C:\users\{user}\appdata\local\temp\icreinstall_installer_microsoft_word_french.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
7/3/2013 2:00:00 AM

Valid to:
7/4/2014 1:59:59 AM

Subject:
CN=ISfreemium, O=ISfreemium, STREET=63 Rothschild 63 BV, L=Tel-Aviv, S=N/A, PostalCode=65785, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
009B517CAF08AA1A85822DB0CE5E9169FE

File PE Metadata
Compilation timestamp:
6/20/1992 12:22:17 AM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:IaQyMJfsGj2TUtL36eClBrNTdod7swsGcR/juS8kLvpFeMwCKgpG0bUQO:IaQyMJfsU2TeL31qBrJddNRLuSPFojox

Entry address:
0x98CC

Entry point:
55, 8B, EC, 83, C4, CC, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, FA, 97, FF, FF, E8, 01, AA, FF, FF, E8, 2C, CC, FF, FF, E8, 73, CC, FF, FF, E8, 0A, F3, FF, FF, E8, 71, F4, FF, FF, 33, C0, 55, 68, 76, 9F, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, 2C, 9F, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, B0, 40, 00, E8, 9B, FE, FF, FF, E8, 26, FA, FF, FF, 8D, 55, F0, 33, C0, E8, E0, D0, FF, FF, 8B, 55, F0, B8, D8, BD, 40, 00, E8, AB, 98, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, D8, BD, 40, 00, B2, 01, B8...
 
[+]

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
36 KB (36,864 bytes)

The file icreinstall_installer_microsoft_word_french.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to os.solvefile.com  (207.189.109.121:80)

TCP (HTTP):
Connects to cdnus.solvefile.com  (207.189.109.121:80)

TCP (HTTP):
Connects to cdneu.webfilescdn.com  (65.254.40.36:80)