1183a7a8-0edb-42fe-9893-1762f79e8236-11.exe

Browseri_Appe 1.2

Robokid Technologies

By using the Crossrider framework, this web extension is loaded in the web browser and displays advertisments on web pages not affiliated by the extension or company. These unwanted advertisements are injected by the extension in the browser in the form of common ad types such as banners and text-links. The application 1183a7a8-0edb-42fe-9893-1762f79e8236-11.exe, “Browseri_Appe 1.2 exe” by Robokid Technologies has been detected as adware by 8 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. It is built using the Crossrider cross-browser extension platform. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider. It is distributed as part of the Brightcircle group of browser-extensions.
Publisher:
app  (signed by Robokid Technologies)

Product:
Browseri_Appe 1.2

Description:
Browseri_Appe 1.2 exe

Version:
1000.1000.1000.1000

MD5:
b71c375470de1377dfa61df012d78259

SHA-1:
bdf2b4ef9661b7aab8b01f27d65e0944ec03c009

SHA-256:
6edc3caa4763a68a005d8fc4de0c66dff292bc65e4a82506bda02ed72e87734d

Scanner detections:
8 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements. Distributed through the Brightcircle investments brand.

Analysis date:
12/24/2024 12:09:15 PM UTC  (today)

Scan engine
Detection
Engine version

AVG
Generic
2015.0.3380

Baidu Antivirus
Adware.Win32.CrossRider
4.0.3.14816

ESET NOD32
Win32/Toolbar.CrossRider.AK (variant)
8.10090

IKARUS anti.virus
AdWare.CrossRider
t3scan.1.6.1.0

Malwarebytes
PUP.Optional.Crossrider.T
v2014.08.16.01

Panda Antivirus
Trj/Genetic.gen
14.08.16.01

Reason Heuristics
PUP.RobokidTechnologies.h
14.8.16.13

VIPRE Antivirus
Crossrider
31248

File size:
1.9 MB (1,959,960 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
Browseri_Appe 1.2.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\browseri_appe 1.2\1183a7a8-0edb-42fe-9893-1762f79e8236-11.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
6/23/2014 1:00:00 AM

Valid to:
6/24/2015 12:59:59 AM

Subject:
CN=Robokid Technologies, O=Robokid Technologies, STREET=Athinodorou 3 Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00ECF35E880AD0F3BC6F82DFB1F2E84CC0

File PE Metadata
Compilation timestamp:
7/12/2014 11:04:38 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
49152:dMC8dmmQkGeSv83kzkRvECDpS0NTeUzn+nPRxm:dMC8fQkZK83jU0

Entry address:
0xEB084

Entry point:
E8, 3A, 00, 01, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 56, 8B, 75, 08, 85, F6, 78, 09, E8, 6D, 01, 01, 00, 3B, 30, 7C, 07, E8, 64, 01, 01, 00, 8B, 30, E8, 57, 01, 01, 00, 8B, 04, B0, 5E, 5D, C3, 55, 8B, EC, 56, E8, 60, 5F, 00, 00, 8B, F0, 85, F6, 75, 07, B8, 90, 0F, 55, 00, EB, 26, 53, 57, 33, FF, BB, 86, 00, 00, 00, 39, 7E, 24, 75, 1B, 6A, 01, 53, E8, 7A, 31, 00, 00, 59, 59, 89, 46, 24, 85, C0, 75, 0A, B8, 90, 0F, 55, 00, 5F, 5B, 5E, 5D, C3, FF, 75, 08, 8B, 76, 24, E8, 90, FF, FF, FF, 50, 53, 56, E8, D1, ED...
 
[+]

Entropy:
6.8647

Code size:
1.1 MB (1,136,640 bytes)

Scheduled Task
Task name:
1183a7a8-0edb-42fe-9893-1762f79e8236-11

Trigger:
Logon (Runs on logon)

Action:
1183a7a8-0edb-42fe-9893-1762f79e8236-11.exe \xuhzgcimp=khlr44smvgp\mz\4vetbqalfwvvxuynp3oe1f54


The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to ip-50-63-202-36.ip.secureserver.net  (50.63.202.36:80)

Remove 1183a7a8-0edb-42fe-9893-1762f79e8236-11.exe - Powered by Reason Core Security