hdocfmrqs.exe

Best Video Converter

Fantastic Tech

This is part of an adware program designed to inject advertising in the web browser (banners, text-links) as well as modify the normal behavior of the browser. Part of the Injekt brand of unwanted programs. The application hdocfmrqs.exe, “BestVideoConverter Service” by Fantastic Tech has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. It runs as a separate (within the context of its own process) windows Service named “HdoCFMrQs”.
Publisher:
Fantastic Tech  (signed and verified)

Product:
Best Video Converter

Description:
BestVideoConverter Service

Version:
1.0.0.0

MD5:
8a2ea6e559bb7e240ed8aec245b118a4

SHA-1:
cb1944a2e0311558ec9837c8b15dca1ba5ca9a06

SHA-256:
4bc26ace1d473ee6acb415cffdcd33fd8b277a001b38bb9232f84bf3da11c865

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Injects display ads (banner ads), in-text ads, interstitial ads, or other types of ads in the web browser as well as alters the browsers settings (home page, search, DNS, and security protocols).

Analysis date:
11/1/2024 3:36:51 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Injekt (M)
17.3.3.17

File size:
78.9 KB (80,840 bytes)

Product version:
1.0.0.0

Copyright:
Copyright © Fantastic Tech 2015

Original file name:
BestVideoConverterService.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\ProgramData\ethccxsvspa\hdocfmrqs.exe

Digital Signature
Signed by:

Authority:
Symantec Corporation

Valid from:
4/29/2015 5:00:00 PM

Valid to:
4/29/2016 4:59:59 PM

Subject:
CN=Fantastic Tech, O=Fantastic Tech, L=St. Michael, S=St. Michael, C=BB

Issuer:
CN=Symantec Class 3 SHA256 Code Signing CA, OU=Symantec Trust Network, O=Symantec Corporation, C=US

Serial number:
1C671B855532F80010EB70036D50FC34

File PE Metadata
Compilation timestamp:
7/31/2015 10:09:40 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

Entry address:
0x1372E

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
7.8442

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
70 KB (71,680 bytes)

Service
Display name:
HdoCFMrQs

Type:
Win32OwnProcess

Depends on:
Winmgmt CryptSvc


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ec2-52-16-174-255.eu-west-1.compute.amazonaws.com  (52.16.174.255:80)

TCP (HTTP):
Connects to ec2-54-246-181-97.eu-west-1.compute.amazonaws.com  (54.246.181.97:80)

Remove hdocfmrqs.exe - Powered by Reason Core Security