01a193aa-0c4a-42fa-adfa-fe014188f8de-3.exe

HD-V1.9

Motoko Group

This adware utilizes the Crossrider extension platform and will inject advertisiments in the Internet browser and may modify core browser settings. Ads will be delivered as banners and contextual text-links and may promote other potentially unwanted software. The application 01a193aa-0c4a-42fa-adfa-fe014188f8de-3.exe by Motoko Group has been detected as adware by 17 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. It is built using the Crossrider cross-browser extension toolkit. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider. It is part of the Brightcircle group of web-extensions that inject advertisements in the browser.
Publisher:
InfoHD-V1.8  (signed by Motoko Group)

Product:
HD-V1.9

Description:
HD-V1.9 exe

Version:
1000.1000.1000.1000

MD5:
12d92fbb74db081ea19d8454b02b2a34

SHA-1:
2e9717b77020bf486c2377f110bfe82b73c25f5d

SHA-256:
38d9ff62ee95e0acbf5855eda9506db8d8a4fa560455b97f510747d73b50f676

Scanner detections:
17 / 68

Status:
Adware

Explanation:
May modify the web browser's settings including changing the homepage and search provider in addition to delivering ads (by injecting banner and text-links directly in the webpage).

Analysis date:
4/18/2024 10:06:46 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Kazy.374062
922

Avira AntiVirus
ADWARE/CrossRider.Gen2
7.11.164.52

AVG
Generic
2015.0.3400

Bitdefender
Gen:Variant.Adware.Kazy.374062
1.0.20.1045

Emsisoft Anti-Malware
Gen:Variant.Adware.Kazy.374062
8.14.07.28.01

ESET NOD32
Win32/Toolbar.CrossRider.AK (variant)
8.10160

F-Secure
Gen:Variant.Adware.Kazy.374062
11.2014-28-07_2

G Data
Gen:Variant.Adware.Kazy.374062
14.7.24

IKARUS anti.virus
not-a-virus:WebToolbar.CrossRider
t3scan.1.6.1.0

Kaspersky
Trojan.NSIS.GoogUpdate
14.0.0.3495

Malwarebytes
PUP.Optional.InfoHD.A
v2014.07.28.01

McAfee
Artemis!12D92FBB74DB
5600.7056

MicroWorld eScan
Gen:Variant.Adware.Kazy.374062
15.0.0.627

Panda Antivirus
Trj/Genetic.gen
14.07.28.01

Reason Heuristics
PUP.MotokoGroup.g
14.7.28.1

Sophos
Generic PUA CO
4.98

VIPRE Antivirus
Crossrider
31656

File size:
1.8 MB (1,936,232 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
HD-V1.9.exe

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\hd-v1.9\01a193aa-0c4a-42fa-adfa-fe014188f8de-3.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
7/18/2014 1:00:00 AM

Valid to:
7/19/2015 12:59:59 AM

Subject:
CN=Motoko Group, O=Motoko Group, STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00AAFC4F8011F7FD7C00748C990950D28A

File PE Metadata
Compilation timestamp:
7/26/2014 11:04:36 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
49152:SRBsKHt7Z6zxFR1XajsZbIR+GpSp4TqKeUzn+nPRxK:SRBLt7Z6vSjsD2h

Entry address:
0xE7014

Entry point:
E8, 3C, 00, 01, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 56, 8B, 75, 08, 85, F6, 78, 09, E8, 6F, 01, 01, 00, 3B, 30, 7C, 07, E8, 66, 01, 01, 00, 8B, 30, E8, 59, 01, 01, 00, 8B, 04, B0, 5E, 5D, C3, 55, 8B, EC, 56, E8, 60, 5F, 00, 00, 8B, F0, 85, F6, 75, 07, B8, 70, AC, 54, 00, EB, 26, 53, 57, 33, FF, BB, 86, 00, 00, 00, 39, 7E, 24, 75, 1B, 6A, 01, 53, E8, 7A, 31, 00, 00, 59, 59, 89, 46, 24, 85, C0, 75, 0A, B8, 70, AC, 54, 00, 5F, 5B, 5E, 5D, C3, FF, 75, 08, 8B, 76, 24, E8, 90, FF, FF, FF, 50, 53, 56, E8, D3, ED...
 
[+]

Code size:
1.1 MB (1,112,064 bytes)

Scheduled Task
Task name:
01a193aa-0c4a-42fa-adfa-fe014188f8de-3

Trigger:
Logon (Runs on logon)

Action:
01a193aa-0c4a-42fa-adfa-fe014188f8de-3.exe \ehyegg=f8qz3dvmazs88f40gbw5kadpp\9gcpqyqkqbzrgjcx


Remove 01a193aa-0c4a-42fa-adfa-fe014188f8de-3.exe - Powered by Reason Core Security