utility.exe

Oral Teams (Extreme White Limited)

The application utility.exe by Oral Teams (Extreme White Limited) has been detected as a potentially unwanted program by 13 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler named MyBrowser triggered to execute each time a user logs in. This file is typically installed with the program MyBrowser by The MyBrowser Authors which is a potentially unwanted software program. It is built using the Crossrider cross-browser extension toolkit. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider.
Publisher:
Oral Teams (Extreme White Limited)  (signed and verified)

Version:
106.0.0.0

MD5:
ff0724826b40bd516ca56b22d90bee93

SHA-1:
dfcf78d93f46556fffa25837ddf0c29733da2673

SHA-256:
83d1da1b9fb44f8eaef76e1e2f7d9df5db1628c8d65e38cfdbf3e416ef4e89e2

Scanner detections:
13 / 68

Status:
Potentially unwanted

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Analysis date:
11/5/2024 5:46:45 AM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
PUP/Win32.CrossRider
2015.10.14

AVG
Generic
2016.0.2957

Bkav FE
W32.HfsAdware
1.3.0.7237

Dr.Web
Trojan.Crossrider1.48874
9.0.1.0286

ESET NOD32
Win32/Toolbar.CrossRider.CZ potentially unwanted (variant)
9.12401

K7 AntiVirus
Unwanted-Program
13.210.17519

Kaspersky
not-a-virus:WebToolbar.Win32.CrossRider
14.0.0.1280

Malwarebytes
PUP.Optional.CrossRider
v2015.10.13.10

Panda Antivirus
Trj/Genetic.gen
15.10.13.10

Reason Heuristics
PUP.ExtremeWhite.Bundler.Meta (M)
15.10.13.22

Sophos
AppRider (PUA)
4.98

Vba32 AntiVirus
suspected of Trojan.Downloader.gen.h
3.12.26.4

VIPRE Antivirus
Crossrider
44520

File size:
1.9 MB (2,004,552 bytes)

Product version:
106.0.0.0

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\mybrowser\mybrowser\application\utility.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
4/14/2015 8:00:00 PM

Valid to:
4/14/2016 7:59:59 PM

Subject:
CN=Oral Teams (Extreme White Limited), O=Oral Teams (Extreme White Limited), STREET=Tassou Papadopulu 6 (flat/office 22), L=Nicosia, S=Agios Dometios, PostalCode=2373, C=CY

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00B8F2E0D231E7596923282FB14A063652

File PE Metadata
Compilation timestamp:
10/12/2015 5:24:04 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
49152:1ZrLZZRGJhr+hCqXzPC6PUfqT4pS6h2K2IdjKexceOkCTuY6:j/ZOt+hhDPBPU4qB

Entry address:
0x13403E

Entry point:
E8, 49, 11, 01, 00, E9, 7F, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, CC, 57, 56, 8B, 74, 24, 10, 8B, 4C, 24, 14, 8B, 7C, 24, 0C, 8B, C1, 8B, D1, 03, C6, 3B, FE, 76, 08, 3B, F8, 0F, 82, 68, 03, 00, 00, 0F, BA, 25, 24, 7E, 5D, 00, 01, 73, 07, F3, A4, E9, 17, 03, 00, 00, 81, F9, 80, 00, 00, 00, 0F, 82, CE, 01, 00, 00, 8B, C7, 33, C6, A9, 0F, 00, 00, 00, 75, 0E, 0F, BA, 25, 48, BE, 5C, 00, 01, 0F, 82, DA, 04, 00, 00, 0F, BA, 25, 24, 7E, 5D, 00, 00, 0F, 83, A7, 01, 00, 00, F7, C7, 03, 00, 00, 00, 0F, 85, B8, 01...
 
[+]

Entropy:
6.6373

Code size:
1.4 MB (1,452,544 bytes)

Scheduled Task
Task name:
MyBrowser

Trigger:
Logon (Runs on logon)


The file utility.exe has been discovered within the following program.

MyBrowser  by The MyBrowser Authors
About 57% of users remove it
 
Powered by Should I Remove It?

The file utility.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to tlb.hwcdn.net  (69.16.175.10:80)

TCP (HTTP):
Connects to ec2-54-243-116-216.compute-1.amazonaws.com  (54.243.116.216:80)

TCP (HTTP):
Connects to s3-website-us-east-1.amazonaws.com  (52.216.1.250:80)

TCP (HTTP):
Connects to ec2-54-83-21-73.compute-1.amazonaws.com  (54.83.21.73:80)

TCP (HTTP):
Connects to ec2-54-243-98-31.compute-1.amazonaws.com  (54.243.98.31:80)

TCP (HTTP):
Connects to ec2-54-243-82-67.compute-1.amazonaws.com  (54.243.82.67:80)

TCP (HTTP):
Connects to ec2-54-243-60-28.compute-1.amazonaws.com  (54.243.60.28:80)

TCP (HTTP):
Connects to ec2-54-243-252-249.compute-1.amazonaws.com  (54.243.252.249:80)

TCP (HTTP):
Connects to ec2-54-243-246-209.compute-1.amazonaws.com  (54.243.246.209:80)

TCP (HTTP):
Connects to ec2-54-243-242-176.compute-1.amazonaws.com  (54.243.242.176:80)

TCP (HTTP):
Connects to ec2-54-243-225-35.compute-1.amazonaws.com  (54.243.225.35:80)

TCP (HTTP):
Connects to ec2-54-243-221-235.compute-1.amazonaws.com  (54.243.221.235:80)

TCP (HTTP):
Connects to ec2-54-243-180-66.compute-1.amazonaws.com  (54.243.180.66:80)

TCP (HTTP):
Connects to ec2-54-243-123-255.compute-1.amazonaws.com  (54.243.123.255:80)

TCP (HTTP):
Connects to ec2-54-243-114-196.compute-1.amazonaws.com  (54.243.114.196:80)

TCP (HTTP):
Connects to ec2-54-235-76-185.compute-1.amazonaws.com  (54.235.76.185:80)

TCP (HTTP):
Connects to ec2-54-235-66-200.compute-1.amazonaws.com  (54.235.66.200:80)

TCP (HTTP):
Connects to ec2-54-235-221-226.compute-1.amazonaws.com  (54.235.221.226:80)

TCP (HTTP):
Connects to ec2-54-235-114-210.compute-1.amazonaws.com  (54.235.114.210:80)

TCP (HTTP):
Connects to ec2-54-225-74-127.compute-1.amazonaws.com  (54.225.74.127:80)

Remove utility.exe - Powered by Reason Core Security