internetenhancer.exe

RDQ4AS

The application internetenhancer.exe has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. This executable runs as a local area network (LAN) Internet proxy server listening on port 50130 and has the ability to intercept and modify all inbound and outbound Internet traffic on the local host. While running, it connects to the Internet address coccoc.com on port 80 using the HTTP protocol.
Product:
RDQ4AS

Version:
2.35.2.74

MD5:
b610164ee874de29887c371b26a13961

SHA-1:
a8a65cdaecce704149eeb66d3f6b90760b51ee2f

SHA-256:
8635206ad7660e3841365a3a72b560eaa3157fce2464866d21171c012b5525bd

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
11/2/2024 9:38:30 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Wajam.Meta (M)
15.8.26.19

File size:
259.5 KB (265,728 bytes)

Product version:
2.35.2.74

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\Program Files\wintenhancer\wintenhancer internet enhancer\internetenhancer.exe

File PE Metadata
Compilation timestamp:
8/26/2015 2:45:25 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
6144:ca7EqJfAretR2vDYlX2EaXG+hLZMX1OV:ca2retR2rYlXLaXG+hLZrV

Entry address:
0x4226E

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
257 KB (263,168 bytes)

Local Proxy Server
Proxy for:
Internet Settings

Local host address:
http://127.0.0.1:50130/

Local host port:
50130

Default credentials:
No


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to coccoc.com  (123.30.175.11:443)

TCP (HTTP):
Connects to server-54-239-132-138.sfo9.r.cloudfront.net  (54.239.132.138:80)

TCP (HTTP):
Connects to server-54-239-132-13.sfo9.r.cloudfront.net  (54.239.132.13:80)

TCP (HTTP):
Connects to rtr3.l7.search.vip.sg3.yahoo.com  (106.10.162.43:80)

TCP (HTTP SSL):
Connects to static.vnpt.vn  (123.30.210.149:443)

TCP (HTTP SSL):
Connects to server-52-85-151-55.hkg51.r.cloudfront.net  (52.85.151.55:443)

TCP (HTTP SSL):
Connects to server-52-85-151-33.hkg51.r.cloudfront.net  (52.85.151.33:443)

TCP (HTTP SSL):
Connects to edge-star-mini-shv-01-hkg3.facebook.com  (31.13.95.36:443)

TCP (HTTP SSL):
Connects to xx-fbcdn-shv-01-sin6.fbcdn.net  (157.240.7.26:443)

TCP (HTTP SSL):
Connects to WIN-MGIB0IP4L15  (123.31.47.32:443)

TCP (HTTP):
Connects to server-54-239-132-70.sfo9.r.cloudfront.net  (54.239.132.70:80)

TCP (HTTP):
Connects to server-54-239-132-51.sfo9.r.cloudfront.net  (54.239.132.51:80)

TCP (HTTP):
Connects to server-54-239-132-39.sfo9.r.cloudfront.net  (54.239.132.39:80)

TCP (HTTP SSL):
Connects to server-54-239-132-26.sfo9.r.cloudfront.net  (54.239.132.26:443)

TCP (HTTP):
Connects to server-54-239-132-217.sfo9.r.cloudfront.net  (54.239.132.217:80)

TCP (HTTP):
Connects to server-54-239-132-213.sfo9.r.cloudfront.net  (54.239.132.213:80)

TCP (HTTP):
Connects to server-54-239-132-151.sfo9.r.cloudfront.net  (54.239.132.151:80)

TCP (HTTP):
Connects to server-54-239-132-132.sfo9.r.cloudfront.net  (54.239.132.132:80)

TCP (HTTP):
Connects to server-54-239-132-113.sfo9.r.cloudfront.net  (54.239.132.113:80)

TCP (HTTP):
Connects to server-54-239-132-107.sfo9.r.cloudfront.net  (54.239.132.107:80)

Remove internetenhancer.exe - Powered by Reason Core Security