ehauuhkwta.exe

TV Wizard

Small Island Development

This is part of an adware program designed to inject advertising in the web browser (banners, text-links) as well as modify the normal behavior of the browser. Part of the Injekt brand of unwanted programs. The application ehauuhkwta.exe by Small Island Development has been detected as adware by 5 anti-malware scanners.
Publisher:
Small Island Development  (signed and verified)

Product:
TV Wizard

Description:
TVWizard

Version:
1.0.0.0

MD5:
e471a265f779ef8033e595926fdd22a6

SHA-1:
ef01e0d3be56a8ee396075c94e1e015b5fca1573

SHA-256:
8a0ef2732e43c9d48ccf4cc3d720cca310df51e6a2cbd8d869569f21c96ee89d

Scanner detections:
5 / 68

Status:
Adware

Explanation:
Injects display ads (banner ads), in-text ads, interstitial ads, or other types of ads in the web browser as well as alters the browsers settings (home page, search, DNS, and security protocols).

Analysis date:
4/19/2024 12:02:43 PM UTC  (today)

Scan engine
Detection
Engine version

Dr.Web
Adware.Downware.8565
9.0.1.05190

ESET NOD32
MSIL/Adware.PullUpdate.E application
7.0.302.0

Malwarebytes
PUP.Optional.TVWizard.A
v2014.09.27.07

Panda Antivirus
Adware/TVWizard
14.09.27.07

Reason Heuristics
PUP.SmallIslandDevelopment.K
14.9.27.19

File size:
48.9 KB (50,032 bytes)

Product version:
1.0.0.0

Copyright:
Copyright © Small Island Development 2014

Original file name:
TVWizard.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\ProgramData\ogqxvbobqe\dat\ehauuhkwta.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
2/6/2014 11:00:00 AM

Valid to:
2/7/2015 10:59:59 AM

Subject:
CN=Small Island Development, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Small Island Development, L=St. James, S=St. James, C=BB

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
31A84249503E31798E91715167A83481

File PE Metadata
Compilation timestamp:
9/24/2014 8:10:55 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
768:U1OLL8mwSjyJUElcKWo9WRTkDWM7ChpWnOieMO9yMxN7vPWvSUfs:XLp4AKWo9MTkDr7+oO9yOy70

Entry address:
0xBF6E

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
7.6502

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
40 KB (40,960 bytes)

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to a92-123-180-145.deploy.akamaitechnologies.com  (92.123.180.145:80)

Remove ehauuhkwta.exe - Powered by Reason Core Security