v6qa192.exe

Running tester

The application v6qa192.exe, “Running tester support” has been detected as a potentially unwanted program by 23 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “SeeWords”. While running, it connects to the Internet address cache.google.com on port 443.
Product:
Running tester

Description:
Running tester support

Version:
1.1.2.3

MD5:
fe32bc58631c3b8c4035d34c665b9469

SHA-1:
029fed91666c92540292254efc267d2f970e6729

Scanner detections:
23 / 68

Status:
Potentially unwanted

Analysis date:
12/26/2024 7:59:30 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Strictor.79342
608

Agnitum Outpost
PUA.AddLyrics
7.1.1

Avira AntiVirus
ADWARE/AddLyrics.359936.25
8.3.1.6

avast!
Win32:Adware-gen [Adw]
2014.9-150607

AVG
AddLyrics_r
2016.0.3086

Baidu Antivirus
Adware.Win32.AddLyrics
4.0.3.1567

Bitdefender
Gen:Variant.Adware.Strictor.79342
1.0.20.790

Dr.Web
Trojan.Lyrics.753
9.0.1.0158

Emsisoft Anti-Malware
Gen:Variant.Adware.Strictor.79342
8.15.06.07.10

ESET NOD32
Win32/Adware.AddLyrics.EF (variant)
9.11635

Fortinet FortiGate
Riskware/AddLyrics
6/7/2015

F-Secure
Gen:Variant.Adware.Strictor
11.2015-07-06_1

G Data
Gen:Variant.Adware.Strictor.79342
15.6.25

McAfee
Artemis!FE32BC58631C
5600.6742

MicroWorld eScan
Gen:Variant.Adware.Strictor.79342
16.0.0.474

NANO AntiVirus
Trojan.Win32.Lyrics.dqtdrm
0.30.24.1357

Panda Antivirus
Trj/Genetic.gen
15.06.07.10

Qihoo 360 Security
HEUR/QVM10.1.Malware.Gen
1.0.0.1015

Reason Heuristics
Threat.Win.Reputation.IMP
15.6.7.6

SUPERAntiSpyware
Adware.AddLyrics/Variant
9828

Trend Micro House Call
TROJ_GEN.R08NC0EE715
7.2.158

Trend Micro
TROJ_GEN.R08NC0EE715
10.465.07

VIPRE Antivirus
Trojan.Win32.Generic
40274

File size:
351.5 KB (359,936 bytes)

Product version:
2.2.2.3

Copyright:
Copyright (C) 2014

Trademarks:
Copyright 2014

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\version90seewords\v6qa192.exe

File PE Metadata
Compilation timestamp:
4/16/2015 12:20:07 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
11.0

CTPH (ssdeep):
6144:GSHPD1CHXKVl7vfyx5/t95ar91/R8Dy3x7wBrg9:NPc3K7vY5/7wJ1/REiOBrY

Entry address:
0x1EA96

Entry point:
E8, FA, 99, 00, 00, E9, 35, FE, FF, FF, 8B, 4C, 24, 04, F7, C1, 03, 00, 00, 00, 74, 24, 8A, 01, 83, C1, 01, 84, C0, 74, 4E, F7, C1, 03, 00, 00, 00, 75, EF, 05, 00, 00, 00, 00, 8D, A4, 24, 00, 00, 00, 00, 8D, A4, 24, 00, 00, 00, 00, 8B, 01, BA, FF, FE, FE, 7E, 03, D0, 83, F0, FF, 33, C2, 83, C1, 04, A9, 00, 01, 01, 81, 74, E8, 8B, 41, FC, 84, C0, 74, 32, 84, E4, 74, 24, A9, 00, 00, FF, 00, 74, 13, A9, 00, 00, 00, FF, 74, 02, EB, CD, 8D, 41, FF, 8B, 4C, 24, 04, 2B, C1, C3, 8D, 41, FE, 8B, 4C, 24, 04, 2B, C1...
 
[+]

Entropy:
6.4511

Code size:
252 KB (258,048 bytes)

Service
Display name:
SeeWords

Type:
Win32OwnProcess


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to ec2-52-20-120-15.compute-1.amazonaws.com  (52.20.120.15:443)

TCP (HTTP SSL):
Connects to kiev-20.cdn77.com  (91.239.235.21:443)

TCP (HTTP SSL):
Connects to ec2-54-243-131-26.compute-1.amazonaws.com  (54.243.131.26:443)

TCP (HTTP SSL):
Connects to e98-251.icpnet.pl  (46.238.98.251:443)

TCP (HTTP):
Connects to e98-235.icpnet.pl  (46.238.98.235:80)

TCP (HTTP SSL):
Connects to cache.google.com  (109.173.137.123:443)

TCP (HTTP):
Connects to waws-prod-bay-003.cloudapp.net  (137.117.17.70:80)

TCP (HTTP):
Connects to NY1WV3659  (204.145.82.27:80)

TCP (HTTP):
Connects to ny1wv3280.xglobe.net  (204.145.82.20:80)

TCP (HTTP SSL):
Connects to liteapps.mcafee.com  (161.69.13.21:443)

TCP (HTTP SSL):
Connects to edge-star-mini-shv-01-waw1.facebook.com  (31.13.81.36:443)

TCP (HTTP SSL):
Connects to ec2-54-247-69-240.eu-west-1.compute.amazonaws.com  (54.247.69.240:443)

TCP (HTTP SSL):
Connects to ec2-54-246-112-140.eu-west-1.compute.amazonaws.com  (54.246.112.140:443)

TCP (HTTP SSL):
Connects to ec2-54-225-205-241.compute-1.amazonaws.com  (54.225.205.241:443)

TCP (HTTP SSL):
Connects to ec2-52-73-109-231.compute-1.amazonaws.com  (52.73.109.231:443)

TCP (HTTP SSL):
Connects to ec2-52-2-10-61.compute-1.amazonaws.com  (52.2.10.61:443)

TCP (HTTP SSL):
Connects to ec2-52-206-203-23.compute-1.amazonaws.com  (52.206.203.23:443)

TCP (HTTP SSL):
Connects to ec2-50-19-109-151.compute-1.amazonaws.com  (50.19.109.151:443)

TCP (HTTP SSL):
Connects to ec2-176-34-253-179.eu-west-1.compute.amazonaws.com  (176.34.253.179:443)

TCP (HTTP SSL):
Connects to e65-89.icpnet.pl  (46.238.65.89:443)

Remove v6qa192.exe - Powered by Reason Core Security