picasa39-setup.exe

TeleCharger Downloader

IS Install (Fried Cookie Ltd.)

The Fried Cookie installer utilizes the InstallCore download manager which may bundle additional offers for various ad-supported toolbars, extensions and utilities. The application picasa39-setup.exe, “Generic Software Setup ” by IS Install (Fried Cookie) has been detected as adware by 15 anti-malware scanners. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions.
Publisher:
TeleCharger  (signed by IS Install (Fried Cookie Ltd.))

Product:
TeleCharger Downloader

Description:
Generic Software Setup

Version:
1.0.5.a0.1_34879

MD5:
c5a67c92304f6a5b094f6659205baef3

SHA-1:
bb363310d2887bf769ca90029f846b8ce0c95ba4

SHA-256:
56339fd709f5084ad35a47b3e4fec7fe7c28d0c4a6f3258ba12c7fe86a37523d

Scanner detections:
15 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This is an installer which may bundle legitimate applications with offers for additional 3rd-party applications that may be unwanted by the user. While the installer contains an 'opt-out' feature this is not set be defult and is usually overlooked.

Analysis date:
11/27/2024 6:51:40 PM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
7.11.210.118

AVG
Generic
2016.0.3164

Baidu Antivirus
Adware.Win32.InstallCore
4.0.3.15321

Comodo Security
Application.Win32.FriedCookie.CIRK
21945

Dr.Web
Trojan.InstallCore.53
9.0.1.080

ESET NOD32
Win32/InstallCore.WI potentially unwanted application
9.7.0.302.0

Fortinet FortiGate
Riskware/InstallCore
3/21/2015

herdProtect (fuzzy)
2015.6.26.22

K7 AntiVirus
Trojan
13.203.15758

McAfee
Artemis!C5A67C92304F
5600.6820

Qihoo 360 Security
Win32/Virus.Adware.eef
1.0.0.1015

Reason Heuristics
PUP.Installer.InstallCore.Installer
15.3.21.5

Sophos
Generic PUA LL
4.98

Trend Micro House Call
Suspicious_GEN.F47V0204
7.2.80

VIPRE Antivirus
Threat.4150696
39676

File size:
685.8 KB (702,264 bytes)

Product version:
1.0.5.a0.1_34879

Copyright:
TeleCharger

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\picasa39-setup.exe

Digital Signature
Authority:
GlobalSign nv-sa

Valid from:
1/19/2015 6:16:01 PM

Valid to:
1/20/2016 6:16:01 PM

Subject:
CN=IS Install (Fried Cookie Ltd.), O=IS Install (Fried Cookie Ltd.), L=Tel Aviv, C=IL

Issuer:
CN=GlobalSign CodeSigning CA - SHA256 - G2, O=GlobalSign nv-sa, C=BE

Serial number:
1121BE44FED807C6F4C0BB9E0615605278D7

File PE Metadata
Compilation timestamp:
6/20/1992 12:22:17 AM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:PsJGXEuheQoYskwbpouIndLqtA4MzxhlDmykTQe8mqYjfpaV1OrbGVdvLKh1zSnw:PsJKE8eQdskwpbGqvqPyyS8JYcVEruhW

Entry address:
0xA5F8

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, CE, 8A, FF, FF, E8, D5, 9C, FF, FF, E8, 64, 9F, FF, FF, E8, 07, A0, FF, FF, E8, A6, BF, FF, FF, E8, 11, E9, FF, FF, E8, 78, EA, FF, FF, 33, C0, 55, 68, C9, AC, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, 92, AC, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 26, F5, FF, FF, E8, 11, F1, FF, FF, 80, 3D, 34, B2, 40, 00, 00, 74, 0C, E8, 23, F6, FF, FF, 33, C0, E8, C4, 97, FF, FF, 8D, 55, F0, 33, C0, E8, B6, C5, FF, FF, 8B, 55...
 
[+]

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
39.5 KB (40,448 bytes)

The file picasa39-setup.exe has been seen being distributed by the following URL.

Remove picasa39-setup.exe - Powered by Reason Core Security