client.exe

ClientWrapper

The application client.exe has been detected as a potentially unwanted program by 2 anti-malware scanners.
Product:
ClientWrapper

Version:
1.0.0.0

MD5:
28a5bb3b4701c6cae6c7b689ba1ee561

SHA-1:
5fbb7d00f6959b1513dd7b93468a0a3ded5cc7bf

SHA-256:
3011490541d54336cbf2c819dbcc89eedd2ea6b15c084bf292c15de35f71bcc0

Scanner detections:
2 / 68

Status:
Potentially unwanted

Analysis date:
12/27/2024 1:58:17 AM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
TR/Crypt.Xpack.199623
8.3.1.6

Reason Heuristics
Adware.Downloader.GB
16.2.28.9

File size:
77 KB (78,848 bytes)

Product version:
1.0.0.0

Copyright:
Copyright © 2015

Original file name:
ClientWrapper.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\Program Files\user extensions\client.exe

File PE Metadata
Compilation timestamp:
5/11/2015 6:26:31 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
1536:3usXRm7cj09H7xVI6QktAUWu17+zC/vjjWO8StCNLjfV5gk:3usXnf4AzY7lv38StClVF

Entry address:
0x1495E

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
5.9039

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
74.5 KB (76,288 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ec2-54-221-254-214.compute-1.amazonaws.com  (54.221.254.214:80)

TCP (HTTP SSL):
Connects to any-in-2678.1e100.net  (216.239.38.120:443)

TCP (HTTP SSL):
Connects to any-in-2014.1e100.net  (216.239.32.20:443)

TCP (HTTP):
Connects to server-54-192-119-116.sfo9.r.cloudfront.net  (54.192.119.116:80)

TCP (HTTP):
Connects to ec2-54-235-170-110.compute-1.amazonaws.com  (54.235.170.110:80)

TCP (HTTP):
Connects to ec2-50-17-224-168.compute-1.amazonaws.com  (50.17.224.168:80)

TCP (HTTP):
Connects to ec2-50-17-217-59.compute-1.amazonaws.com  (50.17.217.59:80)

TCP (HTTP):
Connects to search-core2.bo3.lycos.com  (209.202.251.2:80)

TCP (HTTP):
Connects to replikant412.thinline.cz  (91.239.202.61:80)

TCP (HTTP SSL):
Connects to lygo.com  (209.202.254.60:443)

TCP (HTTP):
Connects to ec2-52-14-104-113.us-east-2.compute.amazonaws.com  (52.14.104.113:80)

TCP (HTTP):
Connects to ec2-23-21-48-109.compute-1.amazonaws.com  (23.21.48.109:80)

TCP (HTTP):
Connects to a198-189-255-207.deploy.akamaitechnolgies.com  (198.189.255.207:80)

TCP (HTTP):

TCP (HTTP):
Connects to vip1.g5.cachefly.net  (66.225.197.197:80)

TCP (HTTP):
Connects to ec2-54-225-79-196.compute-1.amazonaws.com  (54.225.79.196:80)

TCP (HTTP SSL):
Connects to xx-fbcdn-shv-01-ord1.fbcdn.net  (31.13.74.7:443)

TCP (HTTP):
Connects to server-54-192-119-72.sfo9.r.cloudfront.net  (54.192.119.72:80)

TCP (HTTP SSL):
Connects to server-54-192-119-5.sfo9.r.cloudfront.net  (54.192.119.5:443)

TCP (HTTP SSL):
Connects to server-54-192-119-35.sfo9.r.cloudfront.net  (54.192.119.35:443)

Remove client.exe - Powered by Reason Core Security