Launcher.exe

AuraKingdom.to Online

AuraKingdom.To

The application Launcher.exe has been detected as a potentially unwanted program by 20 anti-malware scanners. While running, it connects to the Internet address new-york-20.cdn77.com on port 80 using the HTTP protocol.
Publisher:
AuraKingdom.To

Product:
AuraKingdom.to Online

Version:
1, 1, 1, 1

MD5:
bc14c06cbab76912289f878485dc3050

SHA-1:
d0650883d6da1040ea841f7c2e8b24b7d600edcc

SHA-256:
1de4ed816ecaefda2b87689b1ed1e3637649216fb9410340abfde20505fe8cfc

Scanner detections:
20 / 68

Status:
Potentially unwanted

Analysis date:
12/26/2024 3:49:43 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Symmi.57302
404

Agnitum Outpost
Trojan.VMProtect
7.1.1

Avira AntiVirus
TR/Black.Gen2
8.3.2.4

Arcabit
Trojan.Symmi.DDFD6
1.0.0.629

Baidu Antivirus
PUA.Win32.VMProtect
4.0.3.151228

Bitdefender
Gen:Variant.Symmi.57302
1.0.20.1810

Bkav FE
HW32.Packed
1.3.0.7383

Comodo Security
UnclassifiedMalware
23796

Emsisoft Anti-Malware
Gen:Variant.Symmi.57302
8.15.12.28.06

ESET NOD32
Win32/Packed.VMProtect.ABO (variant)
9.12752

Fortinet FortiGate
W32/VMProtBad.A!tr
12/28/2015

F-Secure
Gen:Variant.Symmi.57302
11.2015-28-12_2

G Data
Gen:Variant.Symmi.57302
15.12.25

K7 AntiVirus
Trojan
13.212.18161

McAfee
Artemis!BC14C06CBAB7
5600.6538

MicroWorld eScan
Gen:Variant.Symmi.57302
16.0.0.1086

Rising Antivirus
PE:Malware.Generic(Thunder)!1.A1C4 [F]
23.00.65.151226

Sophos
Mal/VMProtBad-A
4.98

Trend Micro
TROJ_GEN.R047C0EL315
10.465.28

VIPRE Antivirus
Trojan.Win32.Generic
45948

File size:
4.6 MB (4,837,376 bytes)

Product version:
1, 0, 0, 0

Copyright:
Copyright (C) 2013

Original file name:
Launcher.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\aurakingdom.to private\launcher.exe

File PE Metadata
Compilation timestamp:
11/26/2015 11:51:32 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
8.0

CTPH (ssdeep):
98304:uFWDViACjIh4YIuRT33bkRjFdsqMXA5+XdG3SuUu+ab:uFjrIh4luRTbqvYA5+XbP

Entry address:
0x9C04A3

Entry point:
68, E7, 1C, E5, 7A, E9, 94, 49, 10, 00, A2, 3F, 45, 50, F9, 94, 07, 66, 8E, AC, 15, C3, 2A, C0, FD, ED, 62, 0D, A6, 21, D2, 55, 02, AD, 26, D9, CF, E2, 87, 12, 9B, 4E, 77, 44, B0, 5B, 81, CE, B1, 99, 02, EE, 34, DD, 70, 2F, 23, 76, 4F, A4, 57, CC, 77, E4, 4A, 37, 32, D1, B2, F3, 52, EA, 4B, 9C, 8D, 0D, 64, 53, 04, 82, 1D, 9E, E2, AE, C5, 17, 9A, 72, 5B, 2A, D7, 33, E4, 33, 52, BB, 8E, 8E, B6, F4, 3B, 3A, 2E, 11, 00, B0, 1E, 45, C9, F0, 76, CA, 50, AE, 0D, 02, C2, 0F, 61, 51, 6F, 96, 1A, 61, AD, 78, 15, BC...
 
[+]

Code size:
1.6 MB (1,634,304 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to WebSrv12.x-legend.com.tw.246.199.60.in-addr.arpa  (60.199.246.212:80)

TCP (HTTP):
Connects to WebSrv18.x-legend.com.tw.246.199.60.in-addr.arpa  (60.199.246.218:80)

TCP (HTTP):
Connects to atlanta-20.cdn77.com  (185.152.66.24:80)

TCP (HTTP):
Connects to atlanta-10.cdn77.com  (185.152.66.12:80)

TCP (HTTP):
Connects to xx-fbcdn-shv-01-nrt1.fbcdn.net  (31.13.82.7:80)

TCP (HTTP):
Connects to xx-fbcdn-shv-01-hkg3.fbcdn.net  (31.13.95.12:80)

TCP (HTTP):
Connects to WebSrv17.x-legend.com.tw  (60.199.246.217:80)

TCP (HTTP SSL):
Connects to TIG-Net17-90.trueintergateway.com  (27.123.17.90:443)

TCP (HTTP):
Connects to new-york-20.cdn77.com  (185.59.223.23:80)

TCP (HTTP SSL):
Connects to edge-star-mini-shv-01-nrt1.facebook.com  (31.13.82.36:443)

TCP (HTTP SSL):
Connects to edge-star-mini-shv-01-hkg3.facebook.com  (31.13.95.36:443)

TCP (HTTP SSL):
Connects to ec2-52-201-128-6.compute-1.amazonaws.com  (52.201.128.6:443)

TCP (FTP):
Connects to chicago-20.cdn77.com  (185.93.1.27:21)

TCP (HTTP):
Connects to atlanta-1.cdn77.com  (185.152.66.3:80)

TCP (HTTP SSL):
Connects to a104-64-74-130.deploy.static.akamaitechnologies.com  (104.64.74.130:443)

TCP (HTTP SSL):
Connects to a104-64-60-59.deploy.static.akamaitechnologies.com  (104.64.60.59:443)

TCP (HTTP):
Connects to a104-105-16-160.deploy.static.akamaitechnologies.com  (104.105.16.160:80)

Remove Launcher.exe - Powered by Reason Core Security