etndoa.exe

Secure Web

Big Water Applications, LLC

This is part of an adware program designed to inject advertising in the web browser (banners, text-links) as well as modify the normal behavior of the browser as well as modify the computer’s system settings that control applications to run on startup. Part of the Injekt brand of unwanted programs. The application etndoa.exe by Big Water Applications has been detected as adware by 6 anti-malware scanners. According to AVG, this software downloads additional adware offers during setup.
Publisher:
Big Water Applications, LLC  (signed and verified)

Product:
Secure Web

Description:
SecureWeb

Version:
1.0.0.0

MD5:
72b19d2a5362e4967e0222f2acd0f884

SHA-1:
7e06720241b77f31271d6fbb9d505fcd7d6708cd

SHA-256:
ebd54389b9d2dae754b65e97a769f901bdca9c12c9fbc45b8aa4c1a65656f5f0

Scanner detections:
6 / 68

Status:
Adware

Explanation:
Injects display ads (banner ads), in-text ads, interstitial ads, or other types of ads in the web browser as well as alters the browsers settings (home page, search, DNS, and security protocols).

Analysis date:
11/23/2024 2:38:45 PM UTC  (today)

Scan engine
Detection
Engine version

AVG
Potentially harmful program Downloader.BSH
2014.0.4311

Baidu Antivirus
Adware.MSIL.PullUpdate
4.0.3.15518

ESET NOD32
MSIL/Adware.PullUpdate.G.gen (variant)
9.11642

Malwarebytes
PUP.Optional.SecureWeb.A
v2015.05.18.10

NANO AntiVirus
Trojan.Win32.Downware.dhdcgg
0.30.24.1357

Reason Heuristics
Threat.Injekt.BigWaterApplications
15.5.18.4

File size:
48.8 KB (49,992 bytes)

Product version:
1.0.0.0

Copyright:
Copyright © Big Water Applications, LLC 2014

Original file name:
SecureWeb.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\ProgramData\application data\uuweyjq\dat\etndoa.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
5/27/2014 7:00:00 PM

Valid to:
5/28/2015 6:59:59 PM

Subject:
CN="Big Water Applications, LLC", O="Big Water Applications, LLC", L=La Jolla, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
0C8B8C8404BDAF0C09C54486BDE81E2C

File PE Metadata
Compilation timestamp:
10/1/2014 8:44:40 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
768:im8QhaC2JLZFbJAYTLfdpOXaW+rB9pclRV7Msm0K2WNY1:/50C2JLZVWXi99krMB0dkY1

Entry address:
0xBF5E

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
7.6464

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
40 KB (40,960 bytes)

Remove etndoa.exe - Powered by Reason Core Security