c9f71a51-a0ec-43fb-89c1-e20d85996d3b.exe

videos+ MediaPlayer+

Gogo Network Club

This adware is a web browser extension that will inject advertising in the browser in the form of unwanted banners and text-links which may link to malware sites and install unwanted software. The application c9f71a51-a0ec-43fb-89c1-e20d85996d3b.exe, “videos+ MediaPlayer+ exe” by Gogo Network Club has been detected as adware by 5 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. This file is typically installed with the program videos+ MediaPlayer+ by Gogo Network Club which is a potentially unwanted software program. It is built using the Crossrider cross-browser extension toolkit. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider. It is part of the Brightcircle group of web-extensions that inject advertisements in the browser.
Publisher:
enter  (signed by Gogo Network Club)

Product:
videos+ MediaPlayer+

Description:
videos+ MediaPlayer+ exe

Version:
1000.1000.1000.1000

MD5:
b142f652ec84f33223838038fec393a5

SHA-1:
19e81b1f3fb693de60bfb5736beb2006e413b3d8

SHA-256:
6cdd7b8c61196479a7f4684c651e128f214492c083a42228e8d1d60c0a24c33d

Scanner detections:
5 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Analysis date:
12/27/2024 11:54:57 AM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
ADWARE/CrossRider.Gen2
7.11.171.140

ESET NOD32
Win32/Toolbar.CrossRider.AG potentially unwanted application
7.0.302.0

Panda Antivirus
Trj/Genetic.gen
14.09.10.07

Reason Heuristics
PUP.Crossrider.Task.e
14.9.12.13

VIPRE Antivirus
Threat.4789396
32938

File size:
328.9 KB (336,800 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
videos+ MediaPlayer+.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\videos+ mediaplayer+\c9f71a51-a0ec-43fb-89c1-e20d85996d3b.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
8/19/2014 10:00:00 AM

Valid to:
8/20/2015 9:59:59 AM

Subject:
CN=Gogo Network Club, O=Gogo Network Club, STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Nicosia, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
75BF783471861CAD78DE03A20768BF56

File PE Metadata
Compilation timestamp:
9/10/2014 8:02:32 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
6144:nVkiV0SEgP/vfMH6XYXNpTB8Jwsnwhw+a3:RKU/3MaXYXNpT2j

Entry address:
0x24082

Entry point:
E8, 46, AD, 00, 00, E9, 7F, FE, FF, FF, CC, CC, CC, CC, 57, 56, 53, 33, FF, 8B, 44, 24, 14, 0B, C0, 7D, 14, 47, 8B, 54, 24, 10, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 14, 89, 54, 24, 10, 8B, 44, 24, 1C, 0B, C0, 7D, 14, 47, 8B, 54, 24, 18, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 1C, 89, 54, 24, 18, 0B, C0, 75, 18, 8B, 4C, 24, 18, 8B, 44, 24, 14, 33, D2, F7, F1, 8B, D8, 8B, 44, 24, 10, F7, F1, 8B, D3, EB, 41, 8B, D8, 8B, 4C, 24, 18, 8B, 54, 24, 14, 8B, 44, 24, 10, D1, EB, D1, D9, D1, EA, D1, D8, 0B, DB, 75...
 
[+]

Entropy:
6.4106

Code size:
235.5 KB (241,152 bytes)

Scheduled Task
Task name:
c9f71a51-a0ec-43fb-89c1-e20d85996d3b

Trigger:
Logon (Runs on logon)

Action:
c9f71a51-a0ec-43fb-89c1-e20d85996d3b.exe \agentregpath='videos+ mediaplayer+' \appid=64201


The file c9f71a51-a0ec-43fb-89c1-e20d85996d3b.exe has been discovered within the following program.

videos+ MediaPlayer+  by Gogo Network Club
This is a potentially unwanted adware program that injects ads into the user's browser. This includes inserting into web pages or displaying ads over parts of existing web page advertisements, banners, coupons or text links that would not otherwise appear.
crossrider.com
88% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to s3-website-us-east-1.amazonaws.com  (54.231.114.97:80)

Remove c9f71a51-a0ec-43fb-89c1-e20d85996d3b.exe - Powered by Reason Core Security