hadxvprrfsb.exe

Secure Web

Big Water Applications, LLC

This is part of an adware program designed to inject advertising in the web browser (banners, text-links) as well as modify the normal behavior of the browser as well as modify the computer’s system settings that control applications to run on startup. Part of the Injekt brand of unwanted programs. The application hadxvprrfsb.exe by Big Water Applications has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat.
Publisher:
Big Water Applications, LLC  (signed and verified)

Product:
Secure Web

Description:
SecureWeb

Version:
1.0.0.0

MD5:
49cef42e32cef6d09cd8a58903d384e0

SHA-1:
efbedec9b323b986a618a5ee197b78376eefb318

SHA-256:
72ce3cb6c1cb0dd03982eeff6c4fe4f692c7264c4b56b1984e4cfdbd0e8fef10

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Injects display ads (banner ads), in-text ads, interstitial ads, or other types of ads in the web browser as well as alters the browsers settings (home page, search, DNS, and security protocols).

Analysis date:
9/16/2024 6:34:25 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Injekt.BigWater (M)
16.5.30.9

File size:
48.8 KB (49,992 bytes)

Product version:
1.0.0.0

Copyright:
Copyright © Big Water Applications, LLC 2014

Original file name:
SecureWeb.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\ProgramData\anbhgxzz\dat\hadxvprrfsb.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
5/27/2014 8:00:00 PM

Valid to:
5/28/2015 7:59:59 PM

Subject:
CN="Big Water Applications, LLC", O="Big Water Applications, LLC", L=La Jolla, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
0C8B8C8404BDAF0C09C54486BDE81E2C

File PE Metadata
Compilation timestamp:
8/1/2014 10:19:44 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
768:oGOUlb/bMJcnBqP+ccftGEnIS+nSvvRMp4KOeDOO+TOwALwymKFSNL:jZgyni+ciGII3nShe4KOeDOj+Lw16AL

Entry address:
0xBF7E

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
7.6498

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
40 KB (40,960 bytes)

Remove hadxvprrfsb.exe - Powered by Reason Core Security