classimportwiget.exe

The application classimportwiget.exe has been detected as a potentially unwanted program by 23 anti-malware scanners. This executable runs as a local area network (LAN) Internet proxy server listening on port 33872 and has the ability to intercept and modify all inbound and outbound Internet traffic on the local host.
MD5:
a449d8f9b82a377535f6fd26a890e675

SHA-1:
58538e351ca7254f864a75b698a08e4bc386e72c

SHA-256:
d0db4697250040df4600ed7afb5e3f561c0ddd6efc4ccfed15d36f830940ca4b

Scanner detections:
23 / 68

Status:
Potentially unwanted

Analysis date:
4/23/2024 5:13:32 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Generic.845070
5857434

AegisLab AV Signature
W32.Expiro
2.1.4+

Agnitum Outpost
PUA.Pirrit
7.1.1

AhnLab V3 Security
PUP/Win32.Generic
2014.10.31

Avira AntiVirus
ADWARE/Adware.Gen7
7.11.189.70

avast!
Win32:Adware-gen [Adw]
141119-1

AVG
Adware Generic5
2015.0.3277

Bitdefender
Application.Generic.845070
1.0.20.1660

Clam AntiVirus
Win.Trojan.Application-662
0.98/19576

Emsisoft Anti-Malware
Application.Generic.845070
9.0.0.4570

ESET NOD32
Win32/Adware.Pirrit.I application
7.0.302.0

Fortinet FortiGate
Riskware/Pirrit
11/28/2014

F-Prot
W32/A-6ac1df44
v6.4.7.1.166

F-Secure
Application.Generic.845070
11.2014-28-11_6

G Data
Application.Generic.845070
14.11.24

IKARUS anti.virus
PUA.Pirrit
t3scan.1.8.3.0

K7 AntiVirus
Adware
13.185.13853

MicroWorld eScan
Application.Generic.845070
15.0.0.996

Panda Antivirus
Trj/Genetic.gen
14.11.28.03

Reason Heuristics
Threat.Win.Reputation.IMP
14.11.28.3

Vba32 AntiVirus
AdWare.Tirrip
3.12.26.3

VIPRE Antivirus
Threat.4150696
34232

Zillya! Antivirus
Adware.Pirrit.Win32.8
2.0.0.1974

File size:
303 KB (310,309 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\codecfinderfreeware\classimportwiget.exe

File PE Metadata
Compilation timestamp:
9/23/2014 9:55:50 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
6144:U7VmMvAdtL2fyQtQN3X+1ZkWd/OGmDGlxxy:sVm+Oc/tQUZvxxy

Entry address:
0x1DCD9

Entry point:
E8, A5, 04, 00, 00, E9, 63, FD, FF, FF, CC, FF, 25, 44, 91, 43, 00, FF, 25, 38, 91, 43, 00, 8B, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A3, B0, 7E, 44, 00, 89, 0D, AC, 7E, 44, 00, 89, 15, A8, 7E, 44, 00, 89, 1D, A4, 7E, 44, 00, 89, 35, A0, 7E, 44, 00, 89, 3D, 9C, 7E, 44, 00, 66, 8C, 15, C8, 7E, 44, 00, 66, 8C, 0D, BC, 7E, 44, 00, 66, 8C, 1D, 98, 7E, 44, 00, 66, 8C, 05, 94, 7E, 44, 00, 66, 8C, 25, 90, 7E, 44, 00, 66, 8C, 2D, 8C, 7E, 44, 00, 9C, 8F, 05, C0, 7E, 44, 00, 8B, 45, 00, A3, B4, 7E, 44, 00, 8B, 45...
 
[+]

Entropy:
6.4525

Packer / compiler:
PEQuake V0.06

Code size:
220.5 KB (225,792 bytes)

Local Proxy Server
Proxy for:
Internet Settings

Local host address:
http://127.0.0.1:33872/

Local host port:
33872

Default credentials:
No


Remove classimportwiget.exe - Powered by Reason Core Security