server.exe

Xin Zhou

The application server.exe by Xin Zhou has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. While running, it connects to the Internet address server-54-192-55-34.jfk6.r.cloudfront.net on port 80 using the HTTP protocol.
Publisher:
Xin Zhou  (signed and verified)

MD5:
164bee07b3b4c8e9256d55f49ce643f0

SHA-1:
ff887149186ed30a619717ceeefd1db75eb50ed8

SHA-256:
2c13eb57ab22084c711f66e0a5cb1d6bca004e0b504ff3a86cf13a9e5a8b67f6

Scanner detections:
1 / 68

Status:
Potentially unwanted

Analysis date:
4/19/2024 12:24:18 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.XinZhou (M)
16.2.8.12

File size:
282.2 KB (288,984 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\yessearchesbnd\server.exe

Digital Signature
Signed by:

Authority:
thawte, Inc.

Valid from:
10/23/2015 2:00:00 AM

Valid to:
10/23/2016 1:59:59 AM

Subject:
CN=Xin Zhou, OU=Individual Developer, O=No Organization Affiliation, L=Beijing, S=Beijing, C=CN

Issuer:
CN=thawte SHA256 Code Signing CA, O="thawte, Inc.", C=US

Serial number:
659A8A3384285135321373ABABE9503D

File PE Metadata
Compilation timestamp:
11/20/2015 11:21:00 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
6144:2TPlc5cpNuKw1UY8eU30/jpLd8D9XPlSwo:2zlEc3uPUvE/oD9flSJ

Entry address:
0x19EE4

Entry point:
E8, B9, 53, 00, 00, E9, 7F, FE, FF, FF, CC, CC, 8B, 54, 24, 0C, 8B, 4C, 24, 04, 85, D2, 74, 7F, 0F, B6, 44, 24, 08, 0F, BA, 25, 70, 40, 44, 00, 01, 73, 0D, 8B, 4C, 24, 0C, 57, 8B, 7C, 24, 08, F3, AA, EB, 5D, 8B, 54, 24, 0C, 81, FA, 80, 00, 00, 00, 7C, 0E, 0F, BA, 25, F8, 22, 44, 00, 01, 0F, 82, D7, 58, 00, 00, 57, 8B, F9, 83, FA, 04, 72, 31, F7, D9, 83, E1, 03, 74, 0C, 2B, D1, 88, 07, 83, C7, 01, 83, E9, 01, 75, F6, 8B, C8, C1, E0, 08, 03, C1, 8B, C8, C1, E0, 10, 03, C1, 8B, CA, 83, E2, 03, C1, E9, 02, 74...
 
[+]

Code size:
201.5 KB (206,336 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to server-54-230-163-207.jax1.r.cloudfront.net  (54.230.163.207:80)

TCP (HTTP):
Connects to server-54-230-163-128.jax1.r.cloudfront.net  (54.230.163.128:80)

TCP (HTTP):
Connects to server-52-84-63-182.ord51.r.cloudfront.net  (52.84.63.182:80)

TCP (HTTP):
Connects to server-52-84-33-254.ewr50.r.cloudfront.net  (52.84.33.254:80)

TCP (HTTP):
Connects to server-54-230-206-79.atl50.r.cloudfront.net  (54.230.206.79:80)

TCP (HTTP):
Connects to server-54-230-206-156.atl50.r.cloudfront.net  (54.230.206.156:80)

TCP (HTTP):
Connects to server-54-230-206-155.atl50.r.cloudfront.net  (54.230.206.155:80)

TCP (HTTP):
Connects to server-54-230-163-110.jax1.r.cloudfront.net  (54.230.163.110:80)

TCP (HTTP):
Connects to server-54-192-55-239.jfk6.r.cloudfront.net  (54.192.55.239:80)

TCP (HTTP):
Connects to server-54-230-95-9.fra2.r.cloudfront.net  (54.230.95.9:80)

TCP (HTTP):
Connects to server-54-230-95-253.fra2.r.cloudfront.net  (54.230.95.253:80)

TCP (HTTP):
Connects to server-54-230-81-173.mia50.r.cloudfront.net  (54.230.81.173:80)

TCP (HTTP):
Connects to server-54-230-81-154.mia50.r.cloudfront.net  (54.230.81.154:80)

TCP (HTTP):
Connects to server-54-230-81-136.mia50.r.cloudfront.net  (54.230.81.136:80)

TCP (HTTP):
Connects to server-54-230-206-40.atl50.r.cloudfront.net  (54.230.206.40:80)

TCP (HTTP):
Connects to server-54-230-206-222.atl50.r.cloudfront.net  (54.230.206.222:80)

TCP (HTTP):
Connects to server-54-230-163-7.jax1.r.cloudfront.net  (54.230.163.7:80)

TCP (HTTP):
Connects to server-54-230-163-49.jax1.r.cloudfront.net  (54.230.163.49:80)

TCP (HTTP):
Connects to server-54-230-163-249.jax1.r.cloudfront.net  (54.230.163.249:80)

TCP (HTTP):
Connects to server-54-230-163-232.jax1.r.cloudfront.net  (54.230.163.232:80)

Remove server.exe - Powered by Reason Core Security