pbxerry.exe

Secure Web

Big Water Applications, LLC

This is part of an adware program designed to inject advertising in the web browser (banners, text-links) as well as modify the normal behavior of the browser. Part of the Injekt brand of unwanted programs. The application pbxerry.exe by Big Water Applications has been detected as adware by 4 anti-malware scanners.
Publisher:
Big Water Applications, LLC  (signed and verified)

Product:
Secure Web

Description:
SecureWeb

Version:
1.0.0.0

MD5:
647abe89a18b73e8e5e3215b62286c3b

SHA-1:
da504aad35f4ec7f7e8677e4eee71dab15469878

SHA-256:
fc8334087b6a931f025288230e6f5838b6efdd4134c7baa8ef9e712df1229f65

Scanner detections:
4 / 68

Status:
Adware

Explanation:
Injects display ads (banner ads), in-text ads, interstitial ads, or other types of ads in the web browser as well as alters the browsers settings (home page, search, DNS, and security protocols).

Analysis date:
9/16/2024 6:44:07 PM UTC  (today)

Scan engine
Detection
Engine version

ESET NOD32
MSIL/Adware.PullUpdate (variant)
8.10229

IKARUS anti.virus
AdWare.MSIL.PullUpdate
t3scan.1.6.1.0

Malwarebytes
PUP.Optional.SecureWeb.A
v2014.08.09.02

Reason Heuristics
PUP.BigWaterApplications.H
14.8.9.13

File size:
48.8 KB (49,992 bytes)

Product version:
1.0.0.0

Copyright:
Copyright © Big Water Applications, LLC 2014

Original file name:
SecureWeb.exe

File type:
Executable application (Win64 EXE)

Language:
Language Neutral

Common path:
C:\ProgramData\viozehjshm\dat\pbxerry.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
5/27/2014 8:00:00 PM

Valid to:
5/28/2015 7:59:59 PM

Subject:
CN="Big Water Applications, LLC", O="Big Water Applications, LLC", L=La Jolla, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
0C8B8C8404BDAF0C09C54486BDE81E2C

File PE Metadata
Compilation timestamp:
6/18/2014 6:02:28 PM

OS version:
4.0

OS bitness:
Win64

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
768:Cu7O+fZGo19rY3s2jSaKERZ5H2oV4DhjQ4CRW98Usq/AYyhOeIOqn//7NAv:NRGgpXKMoy1jQ4CRolsnhdqn//RC

Entry address:
0xBF8E

Entry point:
48, A1, 00, 20, 00, 40, 00, 00, 00, 00, FF, E0, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
7.6493

Code size:
40 KB (40,960 bytes)

Remove pbxerry.exe - Powered by Reason Core Security