wsystemshield.exe

One Floor App

One Floor App (Simply Tech/Widdit) distributes and bundles potentially unwanted programs (PUPs) using its OneFloorApp install manager (SimplyInstaller). The application wsystemshield.exe by One Floor App has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Widdit Setup installer. While running, it connects to the Internet address crl.comodoca.com.cdn.cloudflare.net on port 80 using the HTTP protocol.
Publisher:
One Floor App  (signed and verified)

Version:
1.0.0.0

MD5:
944c80a38c410d1e940af8f30bf11824

SHA-1:
de40049b3c49330437eb6b592d586978bf588faa

SHA-256:
226330ac3ac775cbdd8b44de82546542b1df91c8322a293f8c11feba1634b7e0

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
1/9/2025 5:36:27 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Widdit.OneFloor.Bundler (M)
16.4.11.12

File size:
89.1 KB (91,200 bytes)

Product version:
1.0.0.0

Original file name:
ProtectedSearch.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Widdit Setup

Language:
Language Neutral

Common path:
C:\Program Files\hometab\wsystemshield.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
4/7/2014 2:00:00 AM

Valid to:
4/7/2016 1:59:59 AM

Subject:
CN=One Floor App, O=One Floor App, STREET=2 Ben Gurion, L=Ramat Gan, S=Israel, PostalCode=52573, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00A0F147ADC25ABB7A212B2A70DB63456F

File PE Metadata
Compilation timestamp:
10/28/2014 10:41:52 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
1536:Ia48ZioStn743aul8+jPDeodM5/lCHMxMTf6lmWJH+RY1yrXhE12LD:IaioYEKuN/BATHRJH0DhE1w

Entry address:
0x15B8E

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
79 KB (80,896 bytes)

Windows Firewall Allowed Program
Name:
protected search


The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to crl.comodoca.com.cdn.cloudflare.net  (178.255.83.2:80)

Remove wsystemshield.exe - Powered by Reason Core Security