l4d2通用启动器.exe

The application l4d2通用启动器.exe has been detected as a potentially unwanted program by 21 anti-malware scanners. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages. While running, it connects to the Internet address hn.kd.ny.adsl on port 82.
MD5:
2d19aaf1a67b672db3c7aefc3c3da11a

SHA-1:
8bedb979cf78b7c7d8b616c015ea8235b33bdad3

SHA-256:
877959928386ef0a5eb45810d77c189f14820c55d6e0d5664e57e869523b8bb7

Scanner detections:
21 / 68

Status:
Potentially unwanted

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
5/3/2024 6:39:36 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Strictor.63886
350

AegisLab AV Signature
Gen.Variant.Strictor!c
2.1.4+

Avira AntiVirus
TR/Rogue.11640502
8.3.3.2

Arcabit
Trojan.Strictor.DF98E
1.0.0.653

avast!
Win32:Malware-gen
2014.9-160220

Bitdefender
Gen:Variant.Strictor.63886
1.0.20.255

Clam AntiVirus
Win.Trojan.Agent-928091
0.98/21511

Comodo Security
UnclassifiedMalware
24156

Emsisoft Anti-Malware
Gen:Variant.Strictor.63886
8.16.02.20.06

Fortinet FortiGate
Riskware/FlyStudio
2/20/2016

F-Prot
W32/OnlineGames.HI.gen
v6.4.7.1.166

F-Secure
Gen:Variant.Strictor.63886
11.2016-20-02_7

G Data
Gen:Variant.Strictor.63886
16.2.25

IKARUS anti.virus
Trojan.Win32.Pasta
t3scan.2.0.6.0

McAfee
Artemis!2D19AAF1A67B
5600.6484

MicroWorld eScan
Gen:Variant.Strictor.63886
17.0.0.153

NANO AntiVirus
Trojan.Win32.FlyStudio.deikje
1.0.14.6071

Vba32 AntiVirus
SScope.Trojan.PWS.22627
3.12.26.4

VIPRE Antivirus
Trojan.Win32.Generic
47112

ViRobot
Trojan.Win32.Z.Agent.1563648.A[h]
2014.3.20.0

Zillya! Antivirus
Adware.BrowseFox.Win32.309397
2.0.0.2655

File size:
1.5 MB (1,563,648 bytes)

File type:
Executable application (Win32 EXE)

File PE Metadata
Compilation timestamp:
7/29/2014 11:53:37 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
24576:MEkybDnBSA6zojANWlmgTNbYGYjXdJyNZiFiX5OpBuFR:JLnXdYGYRJ2ZiG5Oo

Entry address:
0x315750

Entry point:
60, BE, 00, 60, 5E, 00, 8D, BE, 00, B0, E1, FF, 57, 89, E5, 8D, 9C, 24, 80, C1, FF, FF, 31, C0, 50, 39, DC, 75, FB, 46, 46, 53, 68, 34, 3E, 31, 00, 57, 83, C3, 04, 53, 68, 4E, F7, 12, 00, 56, 83, C3, 04, 53, 50, C7, 03, 03, 00, 02, 00, 90, 90, 90, 90, 90, 55, 57, 56, 53, 83, EC, 7C, 8B, 94, 24, 90, 00, 00, 00, C7, 44, 24, 74, 00, 00, 00, 00, C6, 44, 24, 73, 00, 8B, AC, 24, 9C, 00, 00, 00, 8D, 42, 04, 89, 44, 24, 78, B8, 01, 00, 00, 00, 0F, B6, 4A, 02, 89, C3, D3, E3, 89, D9, 49, 89, 4C, 24, 6C, 0F, B6, 4A...
 
[+]

Entropy:
7.4443

Code size:
1.2 MB (1,249,280 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ip-50-63-202-7.ip.secureserver.net  (50.63.202.7:80)

TCP (HTTP):
Connects to ip-50-63-202-18.ip.secureserver.net  (50.63.202.18:80)

TCP:
Connects to hn.kd.ny.adsl  (42.236.74.209:82)

Remove l4d2通用启动器.exe - Powered by Reason Core Security