ADW_INSTALCOR.GA
AdWare.Win32.InstallCore.f (Kaspersky)
Windows 2000, Windows Server 2003, Windows XP (32-bit, 64-bit), Windows Vista (32-bit, 64-bit), Windows 7 (32-bit, 64-bit)
![](/vinfo/imgFiles/legend.jpg)
Threat Type: Adware
Destructiveness: No
Encrypted:
In the wild: Yes
OVERVIEW
This adware may be manually installed by a user.
TECHNICAL DETAILS
802,096 bytes
EXE
No
26 Aug 2014
Arrival Details
This adware may be manually installed by a user.
Installation
This adware drops the following files:
- %Program Files%\Tweaks\FileOpener\7z.dll
- %Program Files%\Tweaks\FileOpener\fileopener.exe
- %Program Files%\Tweaks\FileOpener\uninstall.exe
- %User Temp%\is{10-digit number}\{7-digit number}_stp.EXE
- %User Temp%\is{10-digit number}\{7-digit number}_stp.EXE.part
- %All Users Profile%\Microsoft\Windows\Start Menu\Programs\FileOpener (Windows Vista and higher versions)
- %All Users Profile%\Microsoft\Windows\Start Menu\Programs\FileOpener\FileOpener.lnk (Windows Vista and higher versions)
- %All Users Profile%\Microsoft\Windows\Start Menu\Programs\FileOpener\uninstall.lnk (Windows Vista and higher versions)
- %System Root%\Users\Public\Desktop\FileOpener.lnk (Windows Vista and higher versions)
- %AppDataLocalLow%\Microsoft\CryptnetUrlCache\Content\1DAF2884EC4DFA96BA4A58D4DBC9C406 (Windows Vista and higher versions)
- %AppDataLocalLow%\Microsoft\CryptnetUrlCache\Content\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771 (Windows Vista and higher versions)
- %AppDataLocalLow%\Microsoft\CryptnetUrlCache\Content\4309200C3DBAD0F6F0DFACE9165FD092 (Windows Vista and higher versions)
- %AppDataLocalLow%\Microsoft\CryptnetUrlCache\Content\49514950C94E8026A2B06312597DFF49_569BD946168DB279A65378F7D088CFD0 (Windows Vista and higher versions)
- %AppDataLocalLow%\Microsoft\CryptnetUrlCache\Content\4997483CBD49861D6724DB29797AB22C_458D4C6BAE4D25B811086B585FFD701D (Windows Vista and higher versions)
- %AppDataLocalLow%\Microsoft\CryptnetUrlCache\Content\8059E9A0D314877E40FE93D8CCFB3C69_DDFBEA63B17F0C1BF12B1E83E3936D7B (Windows Vista and higher versions)
- %AppDataLocalLow%\Microsoft\CryptnetUrlCache\Content\AC9005F5466BD463DF06D711B370595F (Windows Vista and higher versions)
- %AppDataLocalLow%\Microsoft\CryptnetUrlCache\Content\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D (Windows Vista and higher versions)
- %AppDataLocalLow%\Microsoft\CryptnetUrlCache\MetaData\1DAF2884EC4DFA96BA4A58D4DBC9C406 (Windows Vista and higher versions)
- %AppDataLocalLow%\Microsoft\CryptnetUrlCache\MetaData\223DE96EE265046957A660ED7C9DD9E7_EFF9B9BA98DEAA773F261FA85A0B1771 (Windows Vista and higher versions)
- %AppDataLocalLow%\Microsoft\CryptnetUrlCache\MetaData\4309200C3DBAD0F6F0DFACE9165FD092 (Windows Vista and higher versions)
- %AppDataLocalLow%\Microsoft\CryptnetUrlCache\MetaData\49514950C94E8026A2B06312597DFF49_569BD946168DB279A65378F7D088CFD0 (Windows Vista and higher versions)
- %AppDataLocalLow%\Microsoft\CryptnetUrlCache\MetaData\4997483CBD49861D6724DB29797AB22C_458D4C6BAE4D25B811086B585FFD701D (Windows Vista and higher versions)
- %AppDataLocalLow%\Microsoft\CryptnetUrlCache\MetaData\8059E9A0D314877E40FE93D8CCFB3C69_DDFBEA63B17F0C1BF12B1E83E3936D7B (Windows Vista and higher versions)
- %AppDataLocalLow%\Microsoft\CryptnetUrlCache\MetaData\AC9005F5466BD463DF06D711B370595F (Windows Vista and higher versions)
- %AppDataLocalLow%\Microsoft\CryptnetUrlCache\MetaData\EB2C4AB8B68FFA4B7733A9139239A396_D76DB901EE986B889F30D8CC06229E2D (Windows Vista and higher versions)
- %All Users Profile%\Desktop\FileOpener.lnk (Versions lower than Windows Vista)
- %All Users Profile%\Start Menu\Programs\FileOpener (Versions lower than Windows Vista)
- %All Users Profile%\Start Menu\Programs\FileOpener\FileOpener.lnk (Versions lower than Windows Vista)
- %All Users Profile%\Start Menu\Programs\FileOpener\uninstall.lnk (Versions lower than Windows Vista)
- %Application Data%\Microsoft\CryptnetUrlCache\Content\2BF68F4714092295550497DD56F57004 (Versions lower than Windows Vista)
- %Application Data%\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015 (Versions lower than Windows Vista)
- %Application Data%\Microsoft\CryptnetUrlCache\MetaData\2BF68F4714092295550497DD56F57004 (Versions lower than Windows Vista)
- %Application Data%\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015 (Versions lower than Windows Vista)
(Note: %Program Files% is the default Program Files folder, usually C:\Program Files in Windows 2000, Server 2003, and XP (32-bit), Vista (32-bit), and 7 (32-bit), or C:\Program Files (x86) in Windows XP (64-bit), Vista (64-bit), and 7 (64-bit).. %User Temp% is the current user's Temp folder, which is usually C:\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Local\Temp on Windows Vista and 7.. %All Users Profile% is the All Users or Common profile folder, which is C:\Documents and Settings\All Users in Windows 2000, XP, and Server 2003, and C:\ProgramData in Windows Vista and 7.. %System Root% is the root folder, which is usually C:\. It is also where the operating system is located.. %AppDataLocalLow% is the LocalLow Application Data folder, which is usually C:\Users\{user name}\AppData\LocalLow on Windows Vista and 7.. %Application Data% is the current user's Application Data folder, which is usually C:\Documents and Settings\{user name}\Application Data on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Roaming on Windows Vista and 7.)
It creates the following folders:
- %Program Files%\Tweaks
- %Program Files%\Tweaks\FileOpener
- %User Temp%\is{10-digit number}
(Note: %Program Files% is the default Program Files folder, usually C:\Program Files in Windows 2000, Server 2003, and XP (32-bit), Vista (32-bit), and 7 (32-bit), or C:\Program Files (x86) in Windows XP (64-bit), Vista (64-bit), and 7 (64-bit).. %User Temp% is the current user's Temp folder, which is usually C:\Documents and Settings\{user name}\Local Settings\Temp on Windows 2000, XP, and Server 2003, or C:\Users\{user name}\AppData\Local\Temp on Windows Vista and 7.)
Other System Modifications
This adware adds the following registry keys:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Tweaks FileOpener
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
2796BAE63F1801E277261BA0D77770028F20EEE4
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
91C6D6EE3E8AC86384E548C299295C756C817B81 (Windows Vista and higher versions)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
D4DE20D05E66FC53FE1A50882C78DB2852CAE474 (Windows Vista and higher versions)
It adds the following registry entries:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
2796BAE63F1801E277261BA0D77770028F20EEE4
Blob = "{hex value}"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
91C6D6EE3E8AC86384E548C299295C756C817B81
Blob = "{hex value}" (Windows Vista and higher versions)
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
SystemCertificates\AuthRoot\Certificates\
D4DE20D05E66FC53FE1A50882C78DB2852CAE474
Blob = "{hex value}" (Windows Vista and higher versions)
Other Details
This adware adds the following registry entries to add an uninstall option to the Control Panel:
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Tweaks FileOpener
DisplayName = "FileOpener"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Tweaks FileOpener
UninstallString = ""%Program Files%\Tweaks\FileOpener\uninstall.exe""
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Tweaks FileOpener
QuietUninstallString = ""%Program Files%\Tweaks\FileOpener\uninstall.exe" /S"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Tweaks FileOpener
InstallLocation = ""%Program Files%\Tweaks\FileOpener""
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Tweaks FileOpener
DisplayIcon = ""%Program Files%\Tweaks\FileOpener\fileopener.exe""
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Tweaks FileOpener
Publisher = "Tweaks"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Tweaks FileOpener
HelpLink = "http://{BLOCKED}le-opener.com/uninstall.html"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Tweaks FileOpener
URLUpdateInfo = "http://{BLOCKED}ile-opener"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Tweaks FileOpener
URLInfoAbout = "http://{BLOCKED}ile-opener"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Tweaks FileOpener
DisplayVersion = "1.1.1"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Tweaks FileOpener
AlsoInstalled = ""
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Tweaks FileOpener
VersionMajor = "1"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Tweaks FileOpener
VersionMinor = "1"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Tweaks FileOpener
NoModify = "1"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Tweaks FileOpener
NoRepair = "1"
HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\
Windows\CurrentVersion\Uninstall\
Tweaks FileOpener
EstimatedSize = "16233"
It connects to the following possibly malicious URL:
- http://{BLOCKED}76.74.176.175
- http://{BLOCKED}ds.adsrvmedia.net
- http://{BLOCKED}dsrvmedia.adk2.co
- http://{BLOCKED}fs.googleusercontent.com
- http://{BLOCKED}jax.googleapis.com
- http://{BLOCKED}jax.googleapis.com:443
- http://{BLOCKED}dn.adapd.com
- http://{BLOCKED}dn.adk2.co:443
- http://{BLOCKED}dn.adsrvmedia.com
- http://{BLOCKED}dn.adsrvmedia.net
- http://{BLOCKED}dn.delivery49.com
- http://{BLOCKED}dp1.public-trust.com
- http://{BLOCKED}lients1.google.com
- http://{BLOCKED}ounter.d.adapd.com
- http://{BLOCKED}ounter.d.delivery49.com
- http://{BLOCKED}rl.geotrust.com
- http://{BLOCKED}rl.microsoft.com
- http://{BLOCKED}.adapd.com
- http://{BLOCKED}.delivery49.com
- http://{BLOCKED}p.g.doubleclick.net
- http://{BLOCKED}oogleads.g.doubleclick.net
- http://{BLOCKED}tglobal-ocsp.geotrust.com
- http://{BLOCKED}mg.coolvideoconverter.com
- http://{BLOCKED}scrl.microsoft.com
- http://{BLOCKED}csp.godaddy.com
- http://{BLOCKED}s.fileopenerapp.com
- http://{BLOCKED}s2.fileopenerapp.com
- http://{BLOCKED}eturn.uk.domainnamesales.com
- http://{BLOCKED}p.fileopenerapp.com
- http://{BLOCKED}3.amazonaws.com
- http://{BLOCKED}tatic.thefileopenerapp.com
- http://www.{BLOCKED}srvmedia.com
- http://www.{BLOCKED}wnload.windowsupdate.com
- http://www.{BLOCKED}ogle.com
- http://www.{BLOCKED}ogleadservices.com
- http://www.{BLOCKED}tatic.com
- http://www.{BLOCKED}efileopenerapp.com