2014.exe

City Center Games (Extreme White Limited)

The application 2014.exe by City Center Games (Extreme White Limited) has been detected as adware by 16 anti-malware scanners. This file is typically installed with the program Crossbrowse by CLARALABSOFTWARE which is a potentially unwanted software program. It is built using the Crossrider cross-browser extension toolkit. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider. It is also typically executed from the user's temporary directory. The file has been seen being downloaded from sub.sababaishen.com and multiple other hosts. While running, it connects to the Internet address lb-182-252.above.com on port 80 using the HTTP protocol.
Publisher:

Version:
106.0.0.0

MD5:
875d1153314632d8d6b6f06255ea9cae

SHA-1:
838c9640afa3f4e2dc0b9a069c3f45eb41bd4117

SHA-256:
b06b3813c0caa6e7f9139af7fe4c9aae769657a53cb2b905b47389593fedcf0e

Scanner detections:
16 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Analysis date:
12/25/2024 3:44:32 PM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
PUP/Win32.CrossRider
2015.05.17

Avira AntiVirus
ADWARE/CrossRider.1918040.1
8.3.1.6

AVG
Win32/DH{gRITfWUDICIlAFdO}
2016.0.3106

Baidu Antivirus
Adware.Win32.CrossAd
4.0.3.15517

Bkav FE
W32.HfsAdware
1.3.0.6379

Dr.Web
Trojan.Crossrider1.31292
9.0.1.0142

Emsisoft Anti-Malware
Trojan.Generic.14557556
8.15.05.22.02

ESET NOD32
Win32/Toolbar.CrossRider.CN potentially unwanted application
7.0.302.0

F-Secure
Trojan.Generic.14557556
11.2015-22-05_6

Kaspersky
HEUR:Trojan-Downloader.Win32.Generic
14.0.0.2027

Malwarebytes
PUP.Optional.CrossBrowse
v2015.05.17.01

McAfee
Trojan.Artemis!875D11533146
17.6.569.0

Reason Heuristics
PUP.installCore.CityCenterGamesExtremeWhiteLimited
15.5.17.13

Sophos
PUA 'AppRider' (of type Adware)
5.14

Vba32 AntiVirus
suspected of Trojan.Downloader.gen.h
3.12.26.4

VIPRE Antivirus
Threat.4789396
39486

File size:
1.8 MB (1,918,040 bytes)

Product version:
106.0.0.0

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\2014.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
4/15/2015 10:00:00 AM

Valid to:
4/15/2016 9:59:59 AM

Subject:
CN=City Center Games (Extreme White Limited), O=City Center Games (Extreme White Limited), STREET=Tassou Papadopulu 6 (flat/office 22), L=Nicosia, S=Agios Dometios, PostalCode=2373, C=CY

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00808728FFBF020E8929813B59AA2EC529

File PE Metadata
Compilation timestamp:
5/14/2015 6:07:07 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
49152:wcQAetL1sghI/F2gOKByQSnTHpShO36HgPnfQOuO39lzB:5Yta+I/p+tQS

Entry address:
0x12447E

Entry point:
E8, 48, 11, 01, 00, E9, 7F, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, CC, 57, 56, 8B, 74, 24, 10, 8B, 4C, 24, 14, 8B, 7C, 24, 0C, 8B, C1, 8B, D1, 03, C6, 3B, FE, 76, 08, 3B, F8, 0F, 82, 68, 03, 00, 00, 0F, BA, 25, 24, EE, 5B, 00, 01, 73, 07, F3, A4, E9, 17, 03, 00, 00, 81, F9, 80, 00, 00, 00, 0F, 82, CE, 01, 00, 00, 8B, C7, 33, C6, A9, 0F, 00, 00, 00, 75, 0E, 0F, BA, 25, 48, 2E, 5B, 00, 01, 0F, 82, DA, 04, 00, 00, 0F, BA, 25, 24, EE, 5B, 00, 00, 0F, 83, A7, 01, 00, 00, F7, C7, 03, 00, 00, 00, 0F, 85, B8, 01...
 
[+]

Entropy:
6.6619

Code size:
1.3 MB (1,374,208 bytes)

The file 2014.exe has been discovered within the following program.

Crossbrowse  by CLARALABSOFTWARE
87% remove it
 
Powered by Should I Remove It?

The file 2014.exe has been seen being distributed by the following 2 URLs.

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to lb-182-252.above.com  (103.224.182.252:80)

Remove 2014.exe - Powered by Reason Core Security