x3passshowrj176.exe

The application x3passshowrj176.exe has been detected as a potentially unwanted program by 18 anti-malware scanners. This executable runs as a local area network (LAN) Internet proxy server listening on port 14087 and has the ability to intercept and modify all inbound and outbound Internet traffic on the local host.
MD5:
020eaa7b6b68c67c776e939b237b6362

SHA-1:
cb401083b9fc06a65c4b57cf9731a3421a0c074b

SHA-256:
60df10c95fd89bf563aba935033b5644498aa70aa84175c06127c726bec11874

Scanner detections:
18 / 68

Status:
Potentially unwanted

Analysis date:
4/16/2024 12:23:36 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Graftor.150960
885

AhnLab V3 Security
Downloader/Win32.AdCenter
2014.09.02

avast!
Win32:Adware-BWL [Adw]
140813-1

AVG
Adware Generic5.BGJI
2014.0.4015

Baidu Antivirus
Trojan.Win32.AddLyrics
4.0.3.1492

Bitdefender
Gen:Variant.Graftor.150960
1.0.20.1225

Emsisoft Anti-Malware
Gen:Variant.Graftor.150960
8.14.09.02.12

ESET NOD32
Win32/AdWare.AddLyrics.BE application
7.0.302.0

F-Secure
Gen:Variant.Graftor.150960
11.2014-02-09_3

G Data
Gen:Variant.Graftor.150960
14.9.24

MicroWorld eScan
Gen:Variant.Graftor.150960
15.0.0.735

Panda Antivirus
Trj/Genetic.gen
14.09.02.01

Qihoo 360 Security
Win32/Trojan.Dropper.c9f
1.0.0.1015

Reason Heuristics
Threat.Win.Reputation.IMP
14.9.2.12

Rising Antivirus
PE:Trojan.Win32.Generic.171F2CB7!387919031
23.00.65.14831

Sophos
AddLyrics
4.98

Trend Micro House Call
Suspicious_GEN.F47V0802
7.2.245

VIPRE Antivirus
Revizer
32274

File size:
191 KB (195,584 bytes)

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\ver4passshow\x3passshowrj176.exe

File PE Metadata
Compilation timestamp:
8/3/2014 4:40:25 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
11.0

CTPH (ssdeep):
3072:he+eQFW+7Q5DFpFSgtWNZbj+nZpYG3im6jTA9Bb:heIocQRFzLtWNpjD+im6jM/

Entry address:
0x10A32

Entry point:
E8, E1, 67, 00, 00, E9, 7B, FE, FF, FF, CC, CC, CC, CC, 8B, 4C, 24, 04, F7, C1, 03, 00, 00, 00, 74, 24, 8A, 01, 83, C1, 01, 84, C0, 74, 4E, F7, C1, 03, 00, 00, 00, 75, EF, 05, 00, 00, 00, 00, 8D, A4, 24, 00, 00, 00, 00, 8D, A4, 24, 00, 00, 00, 00, 8B, 01, BA, FF, FE, FE, 7E, 03, D0, 83, F0, FF, 33, C2, 83, C1, 04, A9, 00, 01, 01, 81, 74, E8, 8B, 41, FC, 84, C0, 74, 32, 84, E4, 74, 24, A9, 00, 00, FF, 00, 74, 13, A9, 00, 00, 00, FF, 74, 02, EB, CD, 8D, 41, FF, 8B, 4C, 24, 04, 2B, C1, C3, 8D, 41, FE, 8B, 4C...
 
[+]

Entropy:
6.1191

Code size:
99.5 KB (101,888 bytes)

Local Proxy Server
Proxy for:
Internet Settings

Local host address:
http://127.0.0.1:14087/

Local host port:
14087

Default credentials:
No


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to ec2-34-192-150-200.compute-1.amazonaws.com  (34.192.150.200:443)

TCP (HTTP):
Connects to snt-re4-8d.sjc.dropbox.com  (108.160.163.108:80)

TCP (HTTP):
Connects to snt-re4-8c.sjc.dropbox.com  (108.160.163.107:80)

TCP (HTTP):
Connects to sjd-rc1-2a.sjc.dropbox.com  (108.160.165.173:80)

TCP:
Connects to h76.52.132.40.static.ip.windstream.net  (40.132.52.76:10443)

TCP (HTTP SSL):
Connects to h216.155.30.69.static.ip.windstream.net  (69.30.155.216:443)

TCP (HTTP SSL):
Connects to h184.155.30.69.static.ip.windstream.net  (69.30.155.184:443)

TCP (HTTP SSL):
Connects to float.1908.bm-impbus.prod.lax1.adnexus.net  (68.67.128.219:443)

TCP (HTTP):
Connects to float.1632.bm-impbus.prod.lax1.adnexus.net  (68.67.128.151:80)

TCP (HTTP):
Connects to ec2-54-208-30-101.compute-1.amazonaws.com  (54.208.30.101:80)

TCP (HTTP SSL):
Connects to dub407-m.hotmail.com  (157.56.194.24:443)

TCP (HTTP):
Connects to 66-232-96-107.static.hvvc.us  (66.232.96.107:80)

Remove x3passshowrj176.exe - Powered by Reason Core Security