ed2k.exe

aMuleall

http://www.amuleall.org/

The application ed2k.exe, “ED2K Links Handler” has been detected as a potentially unwanted program by 3 anti-malware scanners. It runs as a windows Service named “ed2k idle service”. While running, it connects to the Internet address server-54-192-130-86.ams50.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
http://www.amuleall.org/

Product:
aMuleall

Description:
ED2K Links Handler

Version:
2.4.0

MD5:
e33bfd7d9c2a85c301e4c3c36afabf81

SHA-1:
ec05691631c56d50bc26aa65af00cb1f3fc92ff3

SHA-256:
4cddc825c86ea16587e0ae45c676df1fdf80a92e82b452307f6a904624d00678

Scanner detections:
3 / 68

Status:
Potentially unwanted

Analysis date:
11/27/2024 4:21:21 AM UTC  (today)

Scan engine
Detection
Engine version

ESET NOD32
Win32/Adware.ELEX.EL application
6.3.12010.0

Microsoft Security Essentials
Trojan:Win32/Fuery.B!cl
1.237.829.0

Qihoo 360 Security
HEUR/QVM10.1.0000.Malware.Gen
1.0.0.1120

File size:
233 KB (238,592 bytes)

Product version:
2.4.0

Copyright:
aMuleall Team ( admin@amule.org )

Original file name:
ed2k.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\amulell\ed2k.exe

File PE Metadata
Compilation timestamp:
3/8/2017 3:44:48 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
12.0

Entry address:
0xDD33

Entry point:
E8, D3, C5, 00, 00, E9, 7B, FE, FF, FF, E8, 4C, 70, 00, 00, 8B, D0, 8B, 42, 6C, 3B, 05, 54, AE, 43, 00, 74, 10, 8B, 0D, 18, AF, 43, 00, 85, 4A, 70, 75, 05, E8, 8E, 66, 00, 00, 8B, 40, 04, C3, E8, 26, 70, 00, 00, 8B, D0, 8B, 42, 6C, 3B, 05, 54, AE, 43, 00, 74, 10, 8B, 0D, 18, AF, 43, 00, 85, 4A, 70, 75, 05, E8, 68, 66, 00, 00, 05, A0, 00, 00, 00, C3, E8, FE, 6F, 00, 00, 8B, D0, 8B, 42, 6C, 3B, 05, 54, AE, 43, 00, 74, 10, 8B, 0D, 18, AF, 43, 00, 85, 4A, 70, 75, 05, E8, 40, 66, 00, 00, 8B, 40, 74, C3, 55, 8B...
 
[+]

Code size:
176.5 KB (180,736 bytes)

Service
Display name:
ed2k idle service

Service name:
ed2kidle

Description:
execute ed2k task in idle time

Type:
Win32OwnProcess, InteractiveProcess


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-230-150-232.sin2.r.cloudfront.net  (54.230.150.232:80)

TCP (HTTP):
Connects to server-54-230-150-59.sin2.r.cloudfront.net  (54.230.150.59:80)

TCP (HTTP):
Connects to server-52-84-246-55.sfo20.r.cloudfront.net  (52.84.246.55:80)

TCP (HTTP):
Connects to server-52-84-174-15.gru50.r.cloudfront.net  (52.84.174.15:80)

TCP (HTTP):
Connects to server-54-192-25-248.mxp4.r.cloudfront.net  (54.192.25.248:80)

TCP (HTTP):
Connects to server-54-230-216-160.mrs50.r.cloudfront.net  (54.230.216.160:80)

TCP (HTTP):
Connects to server-52-85-151-175.hkg51.r.cloudfront.net  (52.85.151.175:80)

TCP (HTTP):
Connects to server-54-192-159-131.sin3.r.cloudfront.net  (54.192.159.131:80)

TCP (HTTP):
Connects to server-52-85-151-93.hkg51.r.cloudfront.net  (52.85.151.93:80)

TCP (HTTP):
Connects to server-54-192-75-231.hkg50.r.cloudfront.net  (54.192.75.231:80)

TCP (HTTP):
Connects to server-52-85-83-49.lax1.r.cloudfront.net  (52.85.83.49:80)

TCP (HTTP):
Connects to server-54-230-150-245.sin2.r.cloudfront.net  (54.230.150.245:80)

TCP (HTTP):
Connects to server-54-230-0-121.lhr5.r.cloudfront.net  (54.230.0.121:80)

TCP (HTTP):
Connects to server-54-192-25-34.mxp4.r.cloudfront.net  (54.192.25.34:80)

TCP (HTTP):
Connects to server-54-192-159-222.sin3.r.cloudfront.net  (54.192.159.222:80)

TCP (HTTP):
Connects to server-54-230-59-249.gru1.r.cloudfront.net  (54.230.59.249:80)

TCP (HTTP):
Connects to server-54-230-0-61.lhr5.r.cloudfront.net  (54.230.0.61:80)

TCP (HTTP):
Connects to server-54-230-0-217.lhr5.r.cloudfront.net  (54.230.0.217:80)

TCP (HTTP):
Connects to server-54-192-25-215.mxp4.r.cloudfront.net  (54.192.25.215:80)

TCP (HTTP):
Connects to server-54-240-186-191.mad50.r.cloudfront.net  (54.240.186.191:80)

Remove ed2k.exe - Powered by Reason Core Security