5702ee7b-f299-41c0-9f12-65dd713368b9-5.exe

HD-V1.9

Robokid Technologies

By using the Crossrider framework, this web extension is loaded in the web browser and displays advertisments on web pages not affiliated by the extension or company. These unwanted advertisements are injected by the extension in the browser in the form of common ad types such as banners and text-links. The application 5702ee7b-f299-41c0-9f12-65dd713368b9-5.exe by Robokid Technologies has been detected as adware by 27 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. It is built using the Crossrider cross-browser extension platform. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider. It is distributed as part of the Brightcircle group of browser-extensions.
Publisher:
InfoHD-V1.8  (signed by Robokid Technologies)

Product:
HD-V1.9

Description:
HD-V1.9 exe

Version:
1000.1000.1000.1000

MD5:
f7229c154d754579d3b447f112716353

SHA-1:
1e2a985600106de45abc35b49182b047298b6f4c

SHA-256:
fa0ca1149b20eb9867276c4a68cb397a07820fbc19b0628dd56ac81b1e61b04f

Scanner detections:
27 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements. Distributed through the Brightcircle investments brand.

Analysis date:
12/25/2024 1:39:35 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Application.Heur.Cu1@mqM0ELeO
732

AhnLab V3 Security
PUP/Win32.CrossRider
2014.12.23

Avira AntiVirus
ADWARE/CrossRider.Gen2
7.11.197.44

avast!
Win32:Crossrider-AG [PUP]
2014.9-150203

AVG
Generic
2016.0.3210

Bitdefender
Gen:Application.Heur.Cu1@mqM0ELeO
1.0.20.170

Comodo Security
ApplicUnwnt
20441

Dr.Web
Trojan.Crossrider.31343
9.0.1.034

ESET NOD32
Win32/Toolbar.CrossRider.AH (variant)
9.10915

Fortinet FortiGate
Riskware/Toolbar_CrossRider
2/3/2015

F-Prot
W32/S-9ad4719b
v6.4.7.1.166

F-Secure
Gen:Application.Heur.Cu1@kqM0ELeO
11.2015-03-02_3

G Data
Gen:Application.Heur.Cu1@mqM0ELeO
15.2.24

K7 AntiVirus
Unwanted-Program
13.188.14410

Kaspersky
not-a-virus:WebToolbar.Win32.CroRi
14.0.0.2544

Malwarebytes
PUP.Optional.InfoHD.A
v2015.02.03.06

McAfee
Artemis!F7229C154D75
5600.6866

MicroWorld eScan
Gen:Application.Heur.Cu1@mqM0ELeO
16.0.0.102

NANO AntiVirus
Riskware.Win32.CrossRider.dbmosm
0.28.6.64267

Panda Antivirus
Trj/Genetic.gen
15.02.03.06

Reason Heuristics
Adware.Crossrider.Task.Brightcircle
15.2.3.6

Rising Antivirus
PE:Malware.Obscure!1.9C59
23.00.65.15201

Sophos
AppRider
4.98

Trend Micro House Call
TROJ_GEN.R0C1C0EK614
7.2.34

Trend Micro
TROJ_GEN.R0C1C0EK614
10.465.03

VIPRE Antivirus
Crossrider
35986

Zillya! Antivirus
Adware.CrossRider.Win32.238
2.0.0.2013

File size:
461 KB (472,088 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
HD-V1.9.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\hd-v1.9\5702ee7b-f299-41c0-9f12-65dd713368b9-5.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
6/23/2014 2:00:00 AM

Valid to:
6/24/2015 1:59:59 AM

Subject:
CN=Robokid Technologies, O=Robokid Technologies, STREET=Athinodorou 3 Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00ECF35E880AD0F3BC6F82DFB1F2E84CC0

File PE Metadata
Compilation timestamp:
7/15/2014 12:03:22 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
12288:qpcmdYX7alC7bALlnnpJrb4wi1sVBfpTJi:qFlC7bkpJv4piBBTU

Entry address:
0x3B6A6

Entry point:
E8, FF, CA, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 10, 00, 47, 00, E8, 04, 4A, 00, 00, E8, 78, 1D, 00, 00, 0F, B7, F0, 6A, 02, E8, 92, CA, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, 5C, 52, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Code size:
365.5 KB (374,272 bytes)

Scheduled Task
Task name:
5702ee7b-f299-41c0-9f12-65dd713368b9-5

Trigger:
Logon (Runs on logon)


The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to ip-50-63-202-58.ip.secureserver.net  (50.63.202.58:80)

Remove 5702ee7b-f299-41c0-9f12-65dd713368b9-5.exe - Powered by Reason Core Security