plugin_splice_ experimento mortal _hd.exe

Sergey Panov

This is a WebPick installer that bundles (with very minimal user consent) a number of adware browser extensions which inject ads in the browser. The application plugin_splice_ experimento mortal _hd.exe, “Installer for AppSnow” by Sergey Panov has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the WebPick InstalleRex (Tarma) installer. The file has been seen being downloaded from allbestnew.com. While running, it connects to the Internet address r1.stylezip.info on port 80 using the HTTP protocol.
Publisher:
AppSnow  (signed by Sergey Panov)

Product:
AppSnow

Description:
Installer for AppSnow

Version:
2014.6.19.1201

MD5:
31345d44ccca88102a8cf0a6e20e3656

SHA-1:
627df7199db4f53cb5f096bea7291743670c11d0

SHA-256:
8a88d514b0929c293793610a2fd81b457344cbe1e0400eaddaa8f9e2e56e18f5

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Uses Web-Pick's 'File Product', an Installer which wraps various products and downloads and installs it silently through the process, hosted on TusFiles.

Analysis date:
11/27/2024 8:39:05 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Adware.WebPick.Installer (M)
16.6.28.0

File size:
318.6 KB (326,288 bytes)

Product version:
1.0.0.3

Copyright:
Copyright © 2014 AppSnow

Original file name:
TSULoader.exe

File type:
Executable application (Win32 EXE)

Installer:
WebPick InstalleRex (Tarma)

Common path:
C:\users\{user}\downloads\plugin_splice_ experimento mortal _hd.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
9/25/2013 8:00:00 PM

Valid to:
9/26/2014 7:59:59 PM

Subject:
CN=Sergey Panov, O=Sergey Panov, STREET=Nevsky 34, L=Kiev, S=centr, PostalCode=03062, C=UA

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
67EDB237B456844DA741B5D82EEC432C

File PE Metadata
Compilation timestamp:
3/12/2013 4:51:45 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
6144:Qr5bUzkuvcBYC47l2xGUIWhDcFHgO4nIcsKY3SLiI5:QrqkuveY3EdDcNgtIrKY3iR

Entry address:
0x14DB

Entry point:
55, 8B, EC, 81, EC, 2C, 06, 00, 00, 53, 56, 33, DB, 57, 66, 89, 9D, DC, FB, FF, FF, 89, 5D, F4, 89, 5D, FC, FF, 15, 74, 30, 40, 00, A3, 08, 44, 40, 00, FF, 15, 70, 30, 40, 00, 8B, F8, 8D, 45, EC, 50, FF, 15, 6C, 30, 40, 00, FF, 15, 68, 30, 40, 00, 8B, F0, F7, D6, 33, F7, FF, 15, 64, 30, 40, 00, 33, F0, 8B, 45, F0, 33, 45, EC, 68, 04, 01, 00, 00, 33, F0, 8D, 85, D4, F9, FF, FF, 50, 53, FF, 15, 60, 30, 40, 00, 85, C0, 75, 41, FF, 15, 5C, 30, 40, 00, 83, F8, 78, 75, 1A, 68, A8, 32, 40, 00, E8, 43, FB, FF, FF...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
7.5 KB (7,680 bytes)

The file plugin_splice_ experimento mortal _hd.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to r1.stylezip.info  (54.186.255.26:80)

Remove plugin_splice_ experimento mortal _hd.exe - Powered by Reason Core Security