browser.exe

Speed Browser

Smart Applications

The application browser.exe has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. While running, it connects to the Internet address b4.e0.559e.ip4.static.sl-reverse.com on port 443.
Publisher:
Smart Applications

Product:
Speed Browser

Version:
38.0.2125.19

MD5:
3e0d92dc6f429438a5d4792c876d90c5

SHA-1:
89b227ce91a57f76b4e8634522e1a7c24108497f

SHA-256:
413725ed38e8f6528e04c9a2675eb32e3fff66071eb40294d0d1c21e0cd74d18

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
2/23/2018 8:12:45 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.SmartApplications.Meta (M)
15.6.29.1

File size:
788.5 KB (807,424 bytes)

Product version:
38.0.2125.19

Copyright:
Copyright 2014 Smart Applications. All rights reserved.

Original file name:
browser.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\speed browser\application\browser.exe

File PE Metadata
Compilation timestamp:
12/6/2014 2:57:29 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
12288:9Pi+wVb8/d2LiJlP/A91kBYIUw96YdGX4vU6iWE6HunOHUGiJRJZPYxQCn6jRWf4:9PUVbMlqIUiHunO0GQZhjRBDL

Entry address:
0x44E44

Entry point:
E8, 2B, D0, 00, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 8B, 45, 08, 99, F7, 7D, 0C, 5D, C3, CC, CC, CC, CC, CC, CC, 8B, 44, 24, 08, 8B, 4C, 24, 10, 0B, C8, 8B, 4C, 24, 0C, 75, 09, 8B, 44, 24, 04, F7, E1, C2, 10, 00, 53, F7, E1, 8B, D8, 8B, 44, 24, 08, F7, 64, 24, 14, 03, D8, 8B, 44, 24, 08, F7, E1, 03, D3, 5B, C2, 10, 00, A1, 04, 5A, 49, 00, 56, 6A, 14, 5E, 85, C0, 75, 07, B8, 00, 02, 00, 00, EB, 06, 3B, C6, 7D, 07, 8B, C6, A3, 04, 5A, 49, 00, 6A, 04, 50, E8, 00, 51, 00, 00, A3, 00, 5A, 49, 00, 59, 59, 85, C0...
 
[+]

Entropy:
6.4045

Code size:
388 KB (397,312 bytes)

Windows Firewall Allowed Program
Name:
C:\Program Files\speed browser\Application\browser.exe


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ec2-52-17-158-153.eu-west-1.compute.amazonaws.com  (52.17.158.153:80)

TCP (HTTP):
Connects to cds538.ams.llnw.net  (87.248.203.110:80)

TCP (HTTP):
Connects to cds21219.lon.llnw.net  (178.79.211.188:80)

TCP (HTTP):
Connects to ec2-34-250-194-62.eu-west-1.compute.amazonaws.com  (34.250.194.62:80)

TCP (HTTP SSL):
Connects to b4.e0.559e.ip4.static.sl-reverse.com  (158.85.224.180:443)

TCP (HTTP):
Connects to ec2-52-209-20-4.eu-west-1.compute.amazonaws.com  (52.209.20.4:80)

TCP (HTTP):
Connects to ec2-54-72-47-163.eu-west-1.compute.amazonaws.com  (54.72.47.163:80)

TCP (HTTP):
Connects to ec2-54-171-43-206.eu-west-1.compute.amazonaws.com  (54.171.43.206:80)

TCP (HTTP SSL):
Connects to whatsapp-cdn-shv-01-mad1.fbcdn.net  (31.13.83.51:443)

TCP (HTTP):
Connects to ec2-52-214-166-46.eu-west-1.compute.amazonaws.com  (52.214.166.46:80)

TCP (HTTP SSL):
Connects to bd37c467.virtua.com.br  (189.55.196.103:443)

TCP (HTTP SSL):
Connects to a104-82-169-110.deploy.static.akamaitechnologies.com  (104.82.169.110:443)

TCP (HTTP SSL):
Connects to a104-112-139-237.deploy.static.akamaitechnologies.com  (104.112.139.237:443)

TCP (HTTP SSL):
Connects to a104-112-118-164.deploy.static.akamaitechnologies.com  (104.112.118.164:443)

TCP (HTTP):
Connects to redirector1.dynect.net  (216.146.46.10:80)

TCP (HTTP SSL):
Connects to unknown.telstraglobal.net  (210.176.156.81:443)

TCP (HTTP):
Connects to server-52-85-232-9.atl50.r.cloudfront.net  (52.85.232.9:80)

TCP (HTTP SSL):
Connects to server-52-84-133-198.atl52.r.cloudfront.net  (52.84.133.198:443)

TCP (HTTP SSL):
Connects to r2.ycpi.vip.sg3.yahoo.net  (106.10.199.11:443)

TCP (HTTP SSL):
Connects to r1.ycpi.vip.inc.yahoo.net  (203.84.220.151:443)

Remove browser.exe - Powered by Reason Core Security