0051a384-a22b-4fc7-b722-51fe573da94e-2.exe

TheaterMax2.1V16.01

Berta Dress Apps (Bright Circle Investments Ltd)

This adware is a web browser extension that will inject advertising in the browser in the form of unwanted banners and text-links which may link to malware sites and install unwanted software. The application 0051a384-a22b-4fc7-b722-51fe573da94e-2.exe, “TheaterMax2.1V16.01 exe” by Berta Dress Apps (Bright Circle Investments) has been detected as adware by 29 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. It is built using the Crossrider cross-browser extension platform. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider. It is distributed as part of the Brightcircle group of browser-extensions.
Publisher:
TheaterMaxV16.01  (signed by Berta Dress Apps (Bright Circle Investments Ltd))

Product:
TheaterMax2.1V16.01

Description:
TheaterMax2.1V16.01 exe

Version:
1000.1000.1000.1000

MD5:
07475cb5d943eed28f28c192e8fdad19

SHA-1:
2800b156a521bde9886864cd9dc52e6de417e57a

SHA-256:
6c3f48dffa9c3133503ec313b89f1679f0d46643bfd81df79a25a167897e8143

Scanner detections:
29 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements. Distributed through the Brightcircle investments brand.

Analysis date:
4/25/2024 2:52:34 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Kazy.133004
521

AhnLab V3 Security
PUP/Win32.CrossRider
2015.01.29

Avira AntiVirus
ADWARE/CrossRider.Gen4
7.11.205.178

avast!
Win32:Malware-gen
2014.9-150901

AVG
Generic
2016.0.2999

Bitdefender
Gen:Variant.Adware.Kazy.133004
1.0.20.1220

Clam AntiVirus
Win.Adware.Agent-36517
0.98/21511

Dr.Web
Trojan.Crossrider1.5230
9.0.1.0244

Emsisoft Anti-Malware
Gen:Variant.Adware.Kazy.133004
8.15.09.01.04

ESET NOD32
Win32/Toolbar.CrossRider.BM (variant)
9.11087

Fortinet FortiGate
Riskware/CrossRider
9/1/2015

F-Prot
W32/S-95be3f30
v6.4.7.1.166

F-Secure
Gen:Variant.Adware.Kazy.133004
11.2015-01-09_3

G Data
Gen:Variant.Adware.Kazy.133004
15.9.25

K7 AntiVirus
Unwanted-Program
13.193.14786

Kaspersky
not-a-virus:AdWare.NSIS.Adwapper
14.0.0.1492

Malwarebytes
PUP.Optional.TheaterMax.A
v2015.09.01.04

McAfee
Artemis!07475CB5D943
5600.6655

MicroWorld eScan
Gen:Variant.Adware.Kazy.133004
16.0.0.732

NANO AntiVirus
Trojan.Win32.Crossrider1.dmnxxb
0.30.0.65070

Panda Antivirus
Trj/Genetic.gen
15.09.01.04

Reason Heuristics
Adware.Crossrider.Brightcircle (M)
15.9.1.16

Rising Antivirus
PE:Malware.Obscure!1.9C59
23.00.65.15830

Sophos
AppRider
4.98

Trend Micro House Call
TROJ_GEN.F0C2C00AN15
7.2.244

Trend Micro
TROJ_GEN.F0C2C00AN15
10.465.01

Vba32 AntiVirus
AdWare.Adwapper
3.12.26.3

VIPRE Antivirus
Crossrider
37042

Zillya! Antivirus
Adware.CrossRider.Win32.2187
2.0.0.2048

File size:
922.5 KB (944,608 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
TheaterMax2.1V16.01.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\theatermax2.1v16.01\0051a384-a22b-4fc7-b722-51fe573da94e-2.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
12/16/2014 12:00:00 AM

Valid to:
12/16/2015 11:59:59 PM

Subject:
CN=Berta Dress Apps (Bright Circle Investments Ltd), O=Berta Dress Apps (Bright Circle Investments Ltd), STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Nicosia, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
009C113F566DE374D0EF1F22B0B717D3DC

File PE Metadata
Compilation timestamp:
1/16/2015 5:05:22 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
12288:JRUqiTxfbNQ/+92eheZ8Y4khlUMAvSSYGhDWF962qvMhylppSKxkcpTI6q:YTxfJQ/+gjQSZGJinds3pSKzTc

Entry address:
0x860F0

Entry point:
E8, 1B, B1, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 20, E9, 4D, 00, E8, 3A, 4E, 00, 00, E8, C2, 42, 00, 00, 0F, B7, F0, 6A, 02, E8, AE, B0, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, D3, 53, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Entropy:
6.6082

Code size:
661 KB (676,864 bytes)

Scheduled Task
Task name:
0051a384-a22b-4fc7-b722-51fe573da94e-2

Trigger:
Logon (Runs on logon)


Remove 0051a384-a22b-4fc7-b722-51fe573da94e-2.exe - Powered by Reason Core Security