frameworkengine.exe

Framework

Appealing Apps

This is part of a distribution package that is classified as adware distributed by 50onRed. This adware is used to interact with the installed web browsers and inject ads and modify the default search and homepages. The application frameworkengine.exe by Appealing Apps has been detected as adware by 7 anti-malware scanners. This web browser addon will display additional advertisements in the user's browser including popup, banner, contextual hyperlinks as well as affiliate links.
Publisher:
Appealing Apps  (signed and verified)

Product:
Framework

Description:
FrameworkEngine

Version:
1.1.0.0

MD5:
bbf3c5e48d74077b4be47549e2c383d4

SHA-1:
58cf74592a21a97ec593d1073ad77fc6e3aebe47

SHA-256:
40b5702458c6cd75359042a563fbba6d24807f50f48289c22969f6d71c1285b9

Scanner detections:
7 / 68

Status:
Adware

Explanation:
Browser extension that injects additional advertisements (banner and text links) on web pages.

Analysis date:
4/24/2024 2:45:41 AM UTC  (today)

Scan engine
Detection
Engine version

avast!
Win32:Malware-gen
2014.9-140807

AVG
AdPlugin
2015.0.3483

ESET NOD32
Win32/AdWare.SmartApps (variant)
8.9686

G Data
Win32.Adware.Smartapps
14.5.24

IKARUS anti.virus
AdWare.Smartapps
t3scan.1.6.1.0

Reason Heuristics
Adware.GamePlayLabs.AppealingApps.P
14.8.7.17

VIPRE Antivirus
Trojan.Win32.Generic
28896

File size:
289.8 KB (296,792 bytes)

Product version:
1.1.0.0

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\savings hen\frameworkengine.exe

Digital Signature
Signed by:

Authority:
Thawte, Inc.

Valid from:
6/3/2013 5:00:00 PM

Valid to:
6/4/2014 4:59:59 PM

Subject:
CN=Appealing Apps, O=Appealing Apps, L=Philadelphia, S=Pennsylvania, C=US

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
0444AA3B06F7BBDC2E37AF0824FB38C7

File PE Metadata
Compilation timestamp:
4/20/2014 11:52:15 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
3072:FqGpx2G4+a+Wv0/AGDX5kH/QwwUWNhFRvVPwdW4yMEyAXNigH7FVmd09hpZQalBD:FckNX2fkUdJmyAXXbOd09hpZQa7

Entry address:
0x1FC52

Entry point:
E8, EE, 89, 00, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 51, 8D, 45, FC, 50, 68, 04, 38, 43, 00, 6A, 00, FF, 15, 38, 11, 43, 00, 85, C0, 74, 17, 68, 1C, 38, 43, 00, FF, 75, FC, FF, 15, CC, 11, 43, 00, 85, C0, 74, 05, FF, 75, 08, FF, D0, 8B, E5, 5D, C3, 55, 8B, EC, FF, 75, 08, E8, C1, FF, FF, FF, 59, FF, 75, 08, FF, 15, 3C, 11, 43, 00, CC, 55, 8B, EC, E8, EB, 04, 00, 00, FF, 75, 08, E8, 40, 05, 00, 00, 59, 68, FF, 00, 00, 00, E8, A3, 00, 00, 00, CC, 6A, 01, 6A, 01, 6A, 00, E8, 4D, 01, 00, 00, 83, C4, 0C, C3, 6A...
 
[+]

Entropy:
6.3907

Code size:
192 KB (196,608 bytes)

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to a184-51-126-64.deploy.static.akamaitechnologies.com  (184.51.126.64:80)

Remove frameworkengine.exe - Powered by Reason Core Security