ebookreaderie.exe

EbookReader

ClientConnect LTD

The file belongs to the ClientConnect (Conduit/Perion) platform, a utility that bundles and monetizes search toolbars and browser add-ons. The application ebookreaderie.exe, “EbookReader Setup ” by ClientConnect has been detected as adware by 4 anti-malware scanners. This is a self-extracting archive and installer and has been known to bundle potentially unwanted software. While running, it connects to the Internet address cms.dmccint.com on port 80 using the HTTP protocol.
Publisher:
ClientConnect LTD  (signed and verified)

Product:
EbookReader

Description:
EbookReader Setup

Version:
1.8.4.0.1

MD5:
81acb0eadfc4510b0da726dd9d1a9763

SHA-1:
48c1197edeed5105640543f54ec42f77fb53856f

SHA-256:
6dd58b8986cb8faff1d86082ab01d0a3bdd7135fee8ae0e469a348829db26a4a

Scanner detections:
4 / 68

Status:
Adware

Explanation:
Bundles the Conduit Toolbar and/or Conduit Search Protect.

Analysis date:
5/8/2024 6:17:13 AM UTC  (today)

Scan engine
Detection
Engine version

Dr.Web
Adware.Conduit.179
9.0.1.070

ESET NOD32
Win32/ClientConnect.A potentially unwanted (variant)
9.11199

Reason Heuristics
PUP.Installer.Conduit
15.3.11.23

VIPRE Antivirus
Conduit
37698

File size:
599.3 KB (613,656 bytes)

Product version:
1.8.4.0.1

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\microsoft\windows\inetcache\content.ie5\uargier6\ebookreaderie.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
2/4/2014 11:00:00 AM

Valid to:
2/6/2016 10:59:59 AM

Subject:
CN=ClientConnect LTD, OU=Digital ID Class 3 - Microsoft Software Validation v2, OU=Prod2, O=ClientConnect LTD, L=Ness Ziona, S=Israel, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
7D43A9D40B810B6AC20F2CDF15B5CCF6

File PE Metadata
Compilation timestamp:
7/9/2014 5:58:13 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:pSxG0d888888888888W888888888883Q8AHNlr7e/+HUNKaIo3DJ4yhqJw/Up3c7:kxGYQ8Ulr6GHUoaIo3V4SqJwspU

Entry address:
0x113BC

Entry point:
55, 8B, EC, 83, C4, A4, 53, 56, 57, 33, C0, 89, 45, C4, 89, 45, C0, 89, 45, A4, 89, 45, D0, 89, 45, C8, 89, 45, CC, 89, 45, D4, 89, 45, D8, 89, 45, EC, B8, 2C, 00, 41, 00, E8, E8, 51, FF, FF, 33, C0, 55, 68, 9E, 1A, 41, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, 5A, 1A, 41, 00, 64, FF, 32, 64, 89, 22, A1, 48, 5B, 41, 00, E8, 16, D8, FF, FF, E8, 65, D3, FF, FF, 80, 3D, DC, 2A, 41, 00, 00, 74, 0C, E8, 2B, D9, FF, FF, 33, C0, E8, 80, 32, FF, FF, 8D, 55, EC, 33, C0, E8, E2, A3, FF, FF, 8B, 55, EC, B8, 50, 86...
 
[+]

Entropy:
7.7942

Developed / compiled with:
Microsoft Visual C++

Code size:
63.5 KB (65,024 bytes)

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to cms.dmccint.com  (23.67.242.80:80)

 
http://cms.dmccint.com/DynamicOffer/18869345/18890468/?mainofferId=18865911&CurrentStep=2&TotalSteps=4&DownloadBrowser=IE&CType=-1&UserMode=-1&DMVersion=1.3.8.88.18889334.01&Language=US-EN

Remove ebookreaderie.exe - Powered by Reason Core Security