browser.exe

Speed Browser

Smart Applications

The application browser.exe has been detected as a potentially unwanted program by 2 anti-malware scanners. While running, it connects to the Internet address fna-fbcdn-video-shv-02-fdel1.fbcdn.net on port 443.
Publisher:
Smart Applications

Product:
Speed Browser

Version:
40.0.2214.45

MD5:
acc8ab90d295197318a93f1b043e4cee

SHA-1:
c6d412cd8ab4c4390b43ccdc309b4d1c6510b43b

SHA-256:
fe734fa36c5633373f37e0edde6840cda3fb7c46590002e0f923ca93b8074d66

Scanner detections:
2 / 68

Status:
Potentially unwanted

Analysis date:
10/24/2017 3:47:33 AM UTC  (a few moments ago)

Scan engine
Detection
Engine version

avast!
Win32:Dropper-gen [Drp]
2014.9-150417

Reason Heuristics
PUP.SmartApplications.Meta (M)
15.6.29.1

File size:
779.5 KB (798,208 bytes)

Product version:
40.0.2214.45

Copyright:
Copyright 2014 Smart Applications. All rights reserved.

Original file name:
browser.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\speed browser\application\browser.exe

File PE Metadata
Compilation timestamp:
1/6/2015 7:10:48 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
12288:Qib28txFegN9v42cKclmAMuboABx1hO4vWY+/LmC40nl/zPKcQ/ZhYIJ7RbjRWfo:QiRtpchvWYeLmTI/bGZjZjRBDC

Entry address:
0x42DC8

Entry point:
E8, A7, CD, 00, 00, E9, 7F, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 8B, 44, 24, 08, 8B, 4C, 24, 10, 0B, C8, 8B, 4C, 24, 0C, 75, 09, 8B, 44, 24, 04, F7, E1, C2, 10, 00, 53, F7, E1, 8B, D8, 8B, 44, 24, 08, F7, 64, 24, 14, 03, D8, 8B, 44, 24, 08, F7, E1, 03, D3, 5B, C2, 10, 00, A1, 64, 3A, 49, 00, 56, 6A, 14, 5E, 85, C0, 75, 07, B8, 00, 02, 00, 00, EB, 06, 3B, C6, 7D, 07, 8B, C6, A3, 64, 3A, 49, 00, 6A, 04, 50, E8, C0, 4F, 00, 00, A3, 60, 3A, 49, 00, 59, 59, 85, C0, 75, 1E, 6A, 04...
 
[+]

Code size:
379.5 KB (388,608 bytes)

Shell Open Command
Open type:
ftp

Command:
"C:\Program Files\speed browser\application\browser.exe" -- "%1"


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to unknown.telstraglobal.net  (210.176.156.25:443)

TCP (HTTP SSL):
Connects to fna-fbcdn-video-shv-02-fdel1.fbcdn.net  (157.240.189.82:443)

TCP (HTTP SSL):
Connects to edge-star-shv-01-lht6.facebook.com  (157.240.1.18:443)

TCP (HTTP SSL):
Connects to edge-star-mini-shv-01-lhr3.facebook.com  (31.13.90.36:443)

TCP (HTTP SSL):
Connects to bam-3.nr-data.net  (50.31.164.173:443)

TCP (HTTP):
Connects to a95-101-128-195.deploy.akamaitechnologies.com  (95.101.128.195:80)

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP SSL):
Connects to a104-122-122-218.deploy.static.akamaitechnologies.com  (104.122.122.218:443)

TCP (HTTP SSL):
Connects to a104-108-248-164.deploy.static.akamaitechnologies.com  (104.108.248.164:443)

TCP (HTTP SSL):
Connects to a104-108-238-215.deploy.static.akamaitechnologies.com  (104.108.238.215:443)

TCP (HTTP SSL):
Connects to a104-108-235-98.deploy.static.akamaitechnologies.com  (104.108.235.98:443)

TCP (HTTP SSL):
Connects to a104-108-230-77.deploy.static.akamaitechnologies.com  (104.108.230.77:443)

TCP (HTTP SSL):
Connects to server-52-84-107-234.del51.r.cloudfront.net  (52.84.107.234:443)

TCP (HTTP):
Connects to ec2-52-209-20-4.eu-west-1.compute.amazonaws.com  (52.209.20.4:80)

TCP (HTTP):
Connects to server-54-192-230-42.waw50.r.cloudfront.net  (54.192.230.42:80)

TCP (HTTP):
Connects to server-54-192-229-226.waw50.r.cloudfront.net  (54.192.229.226:80)

TCP (HTTP):
Connects to ip206.ip-94-23-171.eu  (94.23.171.206:80)

Remove browser.exe - Powered by Reason Core Security