{data_post.title_}.exe

Or Follow

Southeastern Blocs

The application {data_post.title_}.exe, “Officer Playfulness” has been detected as a potentially unwanted program by 8 anti-malware scanners. This is a setup program which is used to install the application. It is built using the Crossrider cross-browser extension toolkit. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider. The file has been seen being downloaded from liversions.net.
Publisher:
Southeastern Blocs

Product:
Or Follow

Description:
Officer Playfulness

Version:
4.2.1.3

MD5:
b8f9ec960ef53beabf9b93a43fb06dd9

SHA-1:
5d498855f77cae81e2d1159124e3df88565744c2

SHA-256:
4ca6b09550dc50c5e1a4442df2abca88f174b00a6202c3ac2fe0f05fbc9299a7

Scanner detections:
8 / 68

Status:
Potentially unwanted

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Analysis date:
1/13/2025 5:46:10 PM UTC  (today)

Scan engine
Detection
Engine version

avast!
Win32:Agent-AYLT [PUP]
160326-0

AVG
Adware Generic5.BQWH
2015.0.4545

Dr.Web
Trojan.Crossrider.36840
9.0.1.05190

Emsisoft Anti-Malware
Gen:Variant.Adware.MPlug
11.5.0.6191

ESET NOD32
Win32/Adware.MultiPlug.JX application
8.0.319.0

F-Secure
Variant.Adware.MPlug
5.15.21

McAfee
Program.MultiPlug-FPF
18.0.204.0

Microsoft Security Essentials
Threat.Undefined
1.215.3088.0

File size:
821.5 KB (841,216 bytes)

Product version:
2.2.3.2

Copyright:
All rights reserved for Southeastern Blocs LTD.

Original file name:
{data_post.title_}.exe

File type:
Executable application (Win32 EXE)

Language:
English (United Kingdom)

Common path:
C:\users\{user}\downloads\{data_post.title_}.exe

File PE Metadata
Compilation timestamp:
6/4/2013 1:59:07 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
12288:0uCRoPxew1HBa47PXzEAZ3zz8sSB9gomNOj4y0HPSMGTsyImBd+khGjjWUZfQ1d6:03iYAxzzs6omNXy0vss6HGjKUZozIb

Entry address:
0x16A22

Entry point:
E8, 7C, 48, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 00, 44, 42, 00, E8, E8, 0D, 00, 00, E8, 49, 4A, 00, 00, 0F, B7, F0, 6A, 02, E8, 0F, 48, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, D5, 06, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Entropy:
7.8608  (probably packed)

Code size:
123 KB (125,952 bytes)

The file {data_post.title_}.exe has been seen being distributed by the following URL.

Remove {data_post.title_}.exe - Powered by Reason Core Security