wsmallstub.exe

ClientConnect LTD

The file belongs to the ClientConnect (Conduit/Perion) platform, a utility that bundles and monetizes search toolbars and browser add-ons. The application wsmallstub.exe by ClientConnect has been detected as adware by 7 anti-malware scanners. It is also typically executed from the user's temporary directory.
Publisher:
ClientConnect Ltd.  (signed by ClientConnect LTD)

Version:
1.0.0.1

MD5:
bebe87e70601cbc95c4a6bad2a2e986d

SHA-1:
f9620534bf97ff4ecaadd3afc3808d3abecdac65

SHA-256:
f1fe856f82e455e19d17f09e0b8529993aa540d4231c07065f0c28ecf0f25dd4

Scanner detections:
7 / 68

Status:
Adware

Explanation:
Part of the Conduit/ClientConnect toolbar/extension distribution.

Analysis date:
8/19/2018 4:19:54 AM UTC  (today)

Scan engine
Detection
Engine version

AVG
MalSign.Generic
2015.0.3474

ESET NOD32
Win32/Toolbar.Conduit.AB (variant)
8.9781

Malwarebytes
PUP.Optional.Conduit.A
v2014.05.15.11

Norman
Conduit.YH
11.20140515

Reason Heuristics
PUP.ClientConnect.K
14.8.1.0

Trend Micro House Call
TROJ_GEN.F47V0504
7.2.135

VIPRE Antivirus
Trojan.Win32.Generic
29050

File size:
238.3 KB (244,024 bytes)

Product version:
1.0.0.1

Copyright:
© 2014 ClientConnect Ltd.

Original file name:
wsmallst.exe

File type:
Executable application (Win32 EXE)

Language:
English

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\wsmallstub.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
2/3/2014 7:00:00 PM

Valid to:
2/5/2016 6:59:59 PM

Subject:
CN=ClientConnect LTD, OU=Digital ID Class 3 - Microsoft Software Validation v2, OU=DM4, O=ClientConnect LTD, L=Ness Ziona, S=Israel, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
201C61613E36EF7DD163280196CD80F7

File PE Metadata
Compilation timestamp:
5/4/2014 2:22:55 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
3072:g83pVoRa0CfCcEi8B85BCq/y0+ByJIL9BBSmF2X1eI/pKb+FMAKh:gaEa1fCct8Hq/9gyJIBBGeynEh

Entry address:
0x107AC

Entry point:
E8, C8, B4, 00, 00, E9, 78, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 8B, FF, 55, 8B, EC, 83, EC, 18, 53, 8B, 5D, 0C, 56, 8B, 73, 08, 33, 35, 24, 51, 43, 00, 57, 8B, 06, C6, 45, FF, 00, C7, 45, F4, 01, 00, 00, 00, 8D, 7B, 10, 83, F8, FE, 74, 0D, 8B, 4E, 04, 03, CF, 33, 0C, 38, E8, 97, D8, FF, FF, 8B, 4E, 0C, 8B, 46, 08, 03, CF, 33, 0C, 38, E8, 87, D8, FF, FF, 8B, 45, 08, F6, 40, 04, 66, 0F, 85, 16, 01, 00, 00, 8B, 4D, 10, 8D, 55, E8, 89, 53, FC, 8B, 5B, 0C, 89, 45, E8, 89, 4D, EC, 83, FB, FE, 74...
 
[+]

Code size:
160.5 KB (164,352 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ec2-54-225-182-66.compute-1.amazonaws.com  (54.225.182.66:80)

TCP (HTTP):
Connects to ec2-23-23-99-139.compute-1.amazonaws.com  (23.23.99.139:80)

TCP (HTTP):
Connects to ec2-54-243-208-198.compute-1.amazonaws.com  (54.243.208.198:80)

TCP (HTTP):
Connects to a72-247-9-162.deploy.akamaitechnologies.com  (72.247.9.162:80)

TCP (HTTP):
Connects to a72-247-8-89.deploy.akamaitechnologies.com  (72.247.8.89:80)

TCP (HTTP):
Connects to a72-247-8-121.deploy.akamaitechnologies.com  (72.247.8.121:80)

TCP (HTTP):
Connects to a72-247-10-50.deploy.akamaitechnologies.com  (72.247.10.50:80)

TCP (HTTP):
Connects to a72-247-10-19.deploy.akamaitechnologies.com  (72.247.10.19:80)

TCP (HTTP):
Connects to a72-247-10-17.deploy.akamaitechnologies.com  (72.247.10.17:80)

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):
Connects to a23-67-242-129.deploy.static.akamaitechnologies.com  (23.67.242.129:80)

TCP (HTTP):
Connects to a23-67-242-123.deploy.static.akamaitechnologies.com  (23.67.242.123:80)

TCP (HTTP):
Connects to a23-66-230-152.deploy.static.akamaitechnologies.com  (23.66.230.152:80)

TCP (HTTP):
Connects to a23-66-230-136.deploy.static.akamaitechnologies.com  (23.66.230.136:80)

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):
Connects to a184-28-17-186.deploy.static.akamaitechnologies.com  (184.28.17.186:80)

Remove wsmallstub.exe - Powered by Reason Core Security