ad530605f8bcad06f20aee1138b4c0b8.exe

The application ad530605f8bcad06f20aee1138b4c0b8.exe has been detected as a potentially unwanted program by 2 anti-malware scanners.
Version:
2.40.2.3

MD5:
4bf38524ddeb27a7c591f2986699bd67

SHA-1:
2251eda3a2e9bb181949d0ecda92d22d3938a9ae

SHA-256:
3db71e9c7925ac1f01417198859f944a4ff8c3526f2741b996d3ebe06e909602

Scanner detections:
2 / 68

Status:
Potentially unwanted

Analysis date:
11/5/2024 9:26:46 AM UTC  (today)

Scan engine
Detection
Engine version

Qihoo 360 Security
HEUR/QVM03.0.Malware.Gen
1.0.0.1077

Reason Heuristics
PUP.Wajam.Meta (M)
16.2.9.21

File size:
491 KB (502,784 bytes)

Product version:
2.40.2.3

Original file name:
7HW0FE.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\Program Files\wnetenhancer\wnetenhancer internet enhancer\ad530605f8bcad06f20aee1138b4c0b8.exe

File PE Metadata
Compilation timestamp:
12/4/2015 7:21:08 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
12288:W6BUI3l15fHskM6pJSkKghbNFd6dzxLMteV8KSCOybRs:W6tPsgJkw8x/0

Entry address:
0x7C1CE

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 02, 00, 10, 00, 00, 00, 20, 00, 00, 80, 18, 00, 00, 00, 38, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 01, 00, 00, 00, 50, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 01, 00, 00, 00, 68, 00...
 
[+]

Entropy:
4.7986

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
488.5 KB (500,224 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to rtr3.l7.search.vip.sg3.yahoo.com  (106.10.162.43:80)

TCP (HTTP SSL):
Connects to l1-ha.ycs.id1.yahoo.com  (180.233.119.134:443)

TCP (HTTP SSL):
Connects to ec2-52-211-168-31.eu-west-1.compute.amazonaws.com  (52.211.168.31:443)

TCP (HTTP):
Connects to w8a.rzone.de  (81.169.145.90:80)

TCP (HTTP):
Connects to ec2-52-87-71-213.compute-1.amazonaws.com  (52.87.71.213:80)

TCP (HTTP):
Connects to ec2-52-71-193-144.compute-1.amazonaws.com  (52.71.193.144:80)

TCP (HTTP SSL):
Connects to ec2-52-206-195-243.compute-1.amazonaws.com  (52.206.195.243:443)

TCP (HTTP):
Connects to ec2-107-20-162-204.compute-1.amazonaws.com  (107.20.162.204:80)

TCP (HTTP SSL):
Connects to a23-58-248-94.deploy.static.akamaitechnologies.com  (23.58.248.94:443)

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):
Connects to a104-93-236-59.deploy.static.akamaitechnologies.com  (104.93.236.59:80)

TCP (HTTP SSL):
Connects to 14.141.204.68.static-Pune.vsnl.net.in  (14.141.204.68:443)

TCP (HTTP):

Remove ad530605f8bcad06f20aee1138b4c0b8.exe - Powered by Reason Core Security