hdpurev9.5-codedownloader.exe

HDPureV9.5

Robokid Technologies

By using the Crossrider framework, this web extension is loaded in the web browser and displays advertisments on web pages not affiliated by the extension or company. These unwanted advertisements are injected by the extension in the browser in the form of common ad types such as banners and text-links. The application hdpurev9.5-codedownloader.exe by Robokid Technologies has been detected as adware by 12 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. Built using the Crossrider web brower toolkit the CodeDownloader component will automatically connnect to the remote API server and download additional code/components for HDPure extension/toolbar. The component makes a number of requests to the host app-static.crossrider.com/plugins/.../monetization/monetizationLoader.js. It is part of the Brightcircle group of web-extensions that inject advertisements in the browser.
Publisher:
HDPure  (signed by Robokid Technologies)

Product:
HDPureV9.5

Description:
HDPureV9.5 exe

Version:
1000.1000.1000.1000

MD5:
59f750de1cc281aa530fd7039fda32f1

SHA-1:
3592a2fdb0f4a5cd98b8f69cbdd4e33d9e6148c6

SHA-256:
c4007f870d30267b7b59c178753e091a0c0c16ed2e07127f7daa5aa99af79705

Scanner detections:
12 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Note:
Crossrider is the owner of a platform that enables the creation of cross-browser extensions by developers but is not the owner of this detected application. The owner/publisher of this file is Robokid Technologies.

Analysis date:
12/24/2024 11:47:51 AM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
ADWARE/CrossRider.Gen2
7.11.163.68

AVG
Generic
2015.0.3407

Baidu Antivirus
Adware.Win32.CrossRider
4.0.3.14721

ESET NOD32
Win32/Toolbar.CrossRider.AJ potentially unwanted application
7.0.302.0

F-Prot
W32/A-eb9ef301
v6.4.7.1.166

IKARUS anti.virus
AdWare.Adload
t3scan.1.6.1.0

Malwarebytes
PUP.Optional.HDPure.A
v2014.07.21.10

Panda Antivirus
Trj/Genetic.gen
14.07.21.10

Reason Heuristics
PUP.Crossrider.RobokidTechnologies.Y
14.7.21.10

Rising Antivirus
PE:Malware.Obscure!1.9C59
23.00.65.14719

Sophos
AppRider
4.98

VIPRE Antivirus
Threat.4789396
31208

File size:
534.5 KB (547,352 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
HDPureV9.5.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\hdpurev9.5\hdpurev9.5-codedownloader.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
6/23/2014 4:00:00 AM

Valid to:
6/24/2015 3:59:59 AM

Subject:
CN=Robokid Technologies, O=Robokid Technologies, STREET=Athinodorou 3 Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00ECF35E880AD0F3BC6F82DFB1F2E84CC0

File PE Metadata
Compilation timestamp:
7/12/2014 2:03:59 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
6144:yQF559mEC7X1kitYVOMtIIdM7X7iDEPEdZcIjXUQsuDR61xpTBFA//qh5im:yQt9aaiOmIdM4eEjTUQsuDR0xpTXAHG

Entry address:
0x472D8

Entry point:
E8, F7, CA, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 78, 1B, 48, 00, E8, 02, 4A, 00, 00, E8, 76, 1D, 00, 00, 0F, B7, F0, 6A, 02, E8, 8A, CA, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, DE, 7C, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Entropy:
6.4495

Code size:
425 KB (435,200 bytes)

Scheduled Task
Task name:
8c2446eb-9573-48b8-9ff5-bb65b9824833-1

Trigger:
Logon (Runs on logon)

Action:
hdpurev9.5-codedownloader.exe \upokumg \yiqgl=task \iyhmwot='hdpurev9.5' \ilvnyt


The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to ip-50-63-202-36.ip.secureserver.net  (50.63.202.36:80)

Remove hdpurev9.5-codedownloader.exe - Powered by Reason Core Security