GPlayer.exe

EXETender Client

Exent Technologies Ltd.

The application GPlayer.exe by Exent Technologies has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘Exetender’. While running, it connects to the Internet address 195-12-179-9.static.zebra.lt on port 80 using the HTTP protocol.
Publisher:
Exent Technologies Ltd.  (signed and verified)

Product:
EXETender™ Client

Description:
EXETender Player

Version:
07.04.19.00

MD5:
413007b0dfd42d3165d051f1a535114d

SHA-1:
0d93404db028d1f1aa94b12f83b3525318d66bfc

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
11/15/2024 9:59:39 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.FreeRideGames (L)
17.3.8.13

File size:
4.7 MB (4,959,144 bytes)

Product version:
07.04.19.00

Copyright:
Copyright © 1996-2016 Exent Technologies Ltd. All rights reserved.

Original file name:
GPlayer.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\free ride games\gplayer.exe

Digital Signature
Authority:
Symantec Corporation

Valid from:
8/6/2016 7:00:00 PM

Valid to:
10/2/2017 6:59:59 PM

Subject:
CN=Exent Technologies Ltd., O=Exent Technologies Ltd., L=Petah-Tikva, S=Israel, C=IL

Issuer:
CN=Symantec Class 3 SHA256 Code Signing CA, OU=Symantec Trust Network, O=Symantec Corporation, C=US

Serial number:
1E33B85FE8ED0D1CB42E580D5A9707D0

File PE Metadata
Compilation timestamp:
11/2/2016 10:20:42 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

Entry address:
0x211C74

Entry point:
55, 8B, EC, 6A, FF, 68, A0, E2, 7A, 00, 68, FC, 3C, 61, 00, 64, A1, 00, 00, 00, 00, 50, 64, 89, 25, 00, 00, 00, 00, 83, EC, 58, 53, 56, 57, 89, 65, E8, FF, 15, 54, A4, 79, 00, 33, D2, 8A, D4, 89, 15, 40, 43, 88, 00, 8B, C8, 81, E1, FF, 00, 00, 00, 89, 0D, 3C, 43, 88, 00, C1, E1, 08, 03, CA, 89, 0D, 38, 43, 88, 00, C1, E8, 10, A3, 34, 43, 88, 00, 6A, 01, E8, 41, 63, 00, 00, 59, 85, C0, 75, 08, 6A, 1C, E8, C2, 00, 00, 00, 59, E8, EC, 60, 00, 00, 85, C0, 75, 08, 6A, 10, E8, B1, 00, 00, 00, 59, 33, F6, 89, 75...
 
[+]

Entropy:
6.5605

Developed / compiled with:
Microsoft Visual C++ v6.0

Code size:
3.6 MB (3,772,416 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
Exetender

Command:
"C:\Program Files\free ride games\gplayer.exe" \runonstartup


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to tags.expo9.exponential.com  (204.11.109.75:80)

TCP (HTTP):
Connects to a104-69-67-140.deploy.static.akamaitechnologies.com  (104.69.67.140:80)

TCP (HTTP):

TCP (HTTP):
Connects to a.tribalfusion.com  (204.11.109.66:80)

TCP (HTTP):
Connects to 40.1e.2fa9.ip4.static.sl-reverse.com  (169.47.30.64:80)

TCP (HTTP):
Connects to unknown.telstraglobal.net  (210.176.156.21:80)

TCP (HTTP):
Connects to s-prd-umpxl-adcom-scd-blue-b.evip.aol.com  (149.174.66.131:80)

TCP (HTTP):
Connects to s-prd-umpxl-adcom-scd-a.evip.aol.com  (152.163.13.4:80)

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):
Connects to a23-58-152-158.deploy.static.akamaitechnologies.com  (23.58.152.158:80)

TCP (HTTP):
Connects to static.vnpt.vn  (113.171.234.134:80)

TCP (HTTP):
Connects to s-prd-req-adcom-scd-blue-b.evip.aol.com  (149.174.66.133:80)

TCP (HTTP):
Connects to server-54-192-24-37.mxp4.r.cloudfront.net  (54.192.24.37:80)

TCP (HTTP SSL):
Connects to ox-173-241-248-143.xf.dc.openx.org  (173.241.248.143:443)

TCP (HTTP):
Connects to m-prd-pxl-shared-mr1-blue-a.evip.aol.com  (152.163.50.2:80)

TCP (HTTP SSL):
Connects to edge-atlas-shv-01-gru2.facebook.com  (31.13.85.1:443)

TCP (HTTP):
Connects to ec2-54-89-140-241.compute-1.amazonaws.com  (54.89.140.241:80)

TCP (HTTP):

TCP (HTTP):
Connects to ec2-54-243-142-242.compute-1.amazonaws.com  (54.243.142.242:80)

Remove GPlayer.exe - Powered by Reason Core Security