h0passshowpk176.exe

The application h0passshowpk176.exe has been detected as a potentially unwanted program by 14 anti-malware scanners. This executable runs as a local area network (LAN) Internet proxy server listening on port 14192 and has the ability to intercept and modify all inbound and outbound Internet traffic on the local host. While running, it connects to the Internet address *.112.2o7.net on port 80 using the HTTP protocol.
MD5:
aac2ea716ff6cadc91a59dfad5d8b444

SHA-1:
bcaa9a38f82c7ef8831af769a8296fbe51c6ac95

SHA-256:
ab7375ba0e342e43c567e82cad38e20b863ba1e017e3f125a066acd545bf5d02

Scanner detections:
14 / 68

Status:
Potentially unwanted

Analysis date:
4/26/2024 9:31:37 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Graftor.150960
896

avast!
Win32:Adware-BWL [Adw]
2014.9-140822

AVG
Generic5
2015.0.3374

Baidu Antivirus
Trojan.Win32.AddLyrics
4.0.3.14811

Bitdefender
Gen:Variant.Graftor.150960
1.0.20.1170

Emsisoft Anti-Malware
Gen:Variant.Graftor.150960
8.14.08.22.06

ESET NOD32
Win32/AdWare.AddLyrics.BE (variant)
8.10239

F-Secure
Gen:Variant.Graftor.150960
11.2014-22-08_6

G Data
Gen:Variant.Graftor.150960
14.8.24

MicroWorld eScan
Gen:Variant.Graftor.150960
15.0.0.702

Qihoo 360 Security
Win32/Trojan.Dropper.c9f
1.0.0.1015

Reason Heuristics
Threat.Win.Reputation.IMP
14.8.22.18

Sophos
AddLyrics
4.98

VIPRE Antivirus
Threat.5063086
32210

File size:
190 KB (194,560 bytes)

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\ver4passshow\h0passshowpk176.exe

File PE Metadata
Compilation timestamp:
8/5/2014 12:53:58 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
11.0

CTPH (ssdeep):
3072:be9eQFWKp4h79pFShFuNxU+YvS2hGTEh15sBZXHDgq:bepoO4R9zWFuNWWyaScvXkq

Entry address:
0x10A32

Entry point:
E8, E1, 67, 00, 00, E9, 7B, FE, FF, FF, CC, CC, CC, CC, 8B, 4C, 24, 04, F7, C1, 03, 00, 00, 00, 74, 24, 8A, 01, 83, C1, 01, 84, C0, 74, 4E, F7, C1, 03, 00, 00, 00, 75, EF, 05, 00, 00, 00, 00, 8D, A4, 24, 00, 00, 00, 00, 8D, A4, 24, 00, 00, 00, 00, 8B, 01, BA, FF, FE, FE, 7E, 03, D0, 83, F0, FF, 33, C2, 83, C1, 04, A9, 00, 01, 01, 81, 74, E8, 8B, 41, FC, 84, C0, 74, 32, 84, E4, 74, 24, A9, 00, 00, FF, 00, 74, 13, A9, 00, 00, 00, FF, 74, 02, EB, CD, 8D, 41, FF, 8B, 4C, 24, 04, 2B, C1, C3, 8D, 41, FE, 8B, 4C...
 
[+]

Entropy:
6.1083

Code size:
99.5 KB (101,888 bytes)

Local Proxy Server
Proxy for:
Internet Settings

Local host address:
http://127.0.0.1:14192/

Local host port:
14192

Default credentials:
No


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-230-207-34.atl50.r.cloudfront.net  (54.230.207.34:80)

TCP (HTTP SSL):
Connects to qh-in-f188.1e100.net  (74.125.22.188:443)

TCP (HTTP):
Connects to qg-in-f149.1e100.net  (74.125.29.149:80)

TCP (HTTP SSL):
Connects to qg-in-f101.1e100.net  (74.125.29.101:443)

TCP (HTTP):
Connects to hosted-by.leaseweb.com  (198.7.58.220:80)

TCP (HTTP):
Connects to ec2-54-243-234-55.compute-1.amazonaws.com  (54.243.234.55:80)

TCP (HTTP):
Connects to ec2-54-187-238-196.us-west-2.compute.amazonaws.com  (54.187.238.196:80)

TCP (HTTP SSL):
Connects to ec2-107-21-108-159.compute-1.amazonaws.com  (107.21.108.159:443)

TCP (HTTP SSL):
Connects to a23-73-173-66.deploy.static.akamaitechnologies.com  (23.73.173.66:443)

TCP (HTTP SSL):
Connects to a23-73-148-46.deploy.static.akamaitechnologies.com  (23.73.148.46:443)

TCP (HTTP):
Connects to a23-73-145-169.deploy.static.akamaitechnologies.com  (23.73.145.169:80)

TCP (HTTP):
Connects to a23-67-120-240.deploy.static.akamaitechnologies.com  (23.67.120.240:80)

TCP (HTTP):
Connects to a184-26-136-80.deploy.static.akamaitechnologies.com  (184.26.136.80:80)

TCP (HTTP):
Connects to a184-26-136-123.deploy.static.akamaitechnologies.com  (184.26.136.123:80)

TCP (HTTP):
Connects to a184-26-136-112.deploy.static.akamaitechnologies.com  (184.26.136.112:80)

TCP (HTTP):
Connects to 77-126-232-198.static.unitasglobal.net  (198.232.126.77:80)

TCP (HTTP):
Connects to 224-124-232-198.static.unitasglobal.net  (198.232.124.224:80)

TCP (HTTP):
Connects to 208.43.241.240-static.reverse.softlayer.com  (208.43.241.240:80)

TCP (HTTP):
Connects to *.112.2o7.net  (66.235.139.205:80)

Remove h0passshowpk176.exe - Powered by Reason Core Security