videos+ mediaplayer+-codedownloader.exe

videos+ MediaPlayer+

Pani Poni Network

This adware is a web browser extension that will inject advertising in the browser in the form of unwanted banners and text-links which may link to malware sites and install unwanted software. The application videos+ mediaplayer+-codedownloader.exe, “videos+ MediaPlayer+ exe” by Pani Poni Network has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. This file is typically installed with the program videos+ MediaPlayer+ by Gogo Network Club which is a potentially unwanted software program. Built using the Crossrider web brower toolkit the CodeDownloader component will automatically connnect to the remote API server and download additional code/components for enter extension/toolbar. The component makes a number of requests to the host app-static.crossrider.com/plugins/.../monetization/monetizationLoader.js. It is part of the Brightcircle group of web-extensions that inject advertisements in the browser.
Publisher:
enter  (signed by Pani Poni Network)

Product:
videos+ MediaPlayer+

Description:
videos+ MediaPlayer+ exe

Version:
1000.1000.1000.1000

MD5:
dd8768220c389f3ad01a69ccc9bceb6b

SHA-1:
b385d394337458bbd89b3acc423981af69f45904

SHA-256:
9eaab677fe3527839f69337abe9dc52075909eb109f3acc59f650cceda494a80

Scanner detections:
1 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Note:
Crossrider is the owner of a platform that enables the creation of cross-browser extensions by developers but is not the owner of this detected application. The owner/publisher of this file is Pani Poni Network.

Analysis date:
11/2/2024 11:30:31 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Adware.Crossrider.Brightcircle (M)
16.1.16.22

File size:
1 MB (1,093,024 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
videos+ MediaPlayer+.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\videos+ mediaplayer+\videos+ mediaplayer+-codedownloader.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
8/27/2014 9:00:00 PM

Valid to:
8/28/2015 8:59:59 PM

Subject:
CN=Pani Poni Network, O=Pani Poni Network, STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00D7E501E7ADAA5764867C0B6158D78CDF

File PE Metadata
Compilation timestamp:
9/17/2014 7:08:05 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
24576:eum9Ws5vbBzlx/uYRCeBjM6AkXWfg/JJKpSpbyTH1:eJb5zCOMXgfKpSpbyTV

Entry address:
0x9A87A

Entry point:
E8, C7, 05, 01, 00, E9, 7F, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 8B, 4C, 24, 0C, 57, 85, C9, 0F, 84, 92, 00, 00, 00, 56, 53, 8B, D9, 8B, 74, 24, 14, F7, C6, 03, 00, 00, 00, 8B, 7C, 24, 10, 75, 0B, C1, E9, 02, 0F, 85, 85, 00, 00, 00, EB, 27, 8A, 06, 83, C6, 01, 88, 07, 83, C7, 01, 83, E9, 01, 74, 2B, 84, C0, 74, 2F, F7, C6, 03, 00, 00, 00, 75, E5, 8B, D9, C1, E9, 02, 75, 61, 83, E3, 03, 74, 13, 8A, 06, 83, C6, 01, 88, 07, 83, C7, 01, 84, C0, 74, 37, 83, EB, 01, 75, ED, 8B, 44, 24, 10...
 
[+]

Code size:
773.5 KB (792,064 bytes)

Scheduled Task
Task name:
422ba774-421e-47c0-a783-cd0b41ccf1ac-1

Trigger:
Logon (Runs on logon)


The file videos+ mediaplayer+-codedownloader.exe has been discovered within the following program.

videos+ MediaPlayer+  by Gogo Network Club
This is a potentially unwanted adware program that injects ads into the user's browser. This includes inserting into web pages or displaying ads over parts of existing web page advertisements, banners, coupons or text links that would not otherwise appear.
crossrider.com
88% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to ip-50-63-202-37.ip.secureserver.net  (50.63.202.37:80)

Remove videos+ mediaplayer+-codedownloader.exe - Powered by Reason Core Security