1ac07856-f877-4669-b64e-c6c8da3fb7b2-6.exe

HD_Quality_v1.1

Motoko Group

This adware utilizes the Crossrider extension platform and will inject advertisiments in the Internet browser and may modify core browser settings. Ads will be delivered as banners and contextual text-links and may promote other potentially unwanted software. The application 1ac07856-f877-4669-b64e-c6c8da3fb7b2-6.exe, “HD_Quality_v1.1 exe” by Motoko Group has been detected as adware by 17 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. It is built using the Crossrider cross-browser extension platform. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider. It is distributed as part of the Brightcircle group of browser-extensions.
Publisher:
HD_Quality  (signed by Motoko Group)

Product:
HD_Quality_v1.1

Description:
HD_Quality_v1.1 exe

Version:
1000.1000.1000.1000

MD5:
9bb20bf8239b81a77de7f20836a416c5

SHA-1:
adb60674f698626214ccf7b48c0a354b744ff5e6

SHA-256:
e171ae83343bda6e44f6b89215e96ffcc93f949837fb8b384e071cc45649f5d0

Scanner detections:
17 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements. Distributed through the Brightcircle investments brand.

Analysis date:
5/6/2024 2:19:01 AM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
PUP/Win32.Toolbar
2014.08.13

Avira AntiVirus
ADWARE/CrossRider.Gen2
7.11.166.212

AVG
Generic
2015.0.3385

Dr.Web
Trojan.Crossrider.27748
9.0.1.0224

ESET NOD32
Win32/Toolbar.CrossRider.AE potentially unwanted application
8.7.0.302.0

Fortinet FortiGate
W32/GoogUpdate.AE!tr
10/1/2014

F-Prot
W32/A-7d811582
v6.4.7.1.166

IKARUS anti.virus
PUA.PlusHD
t3scan.1.6.1.0

Kaspersky
Trojan.NSIS.GoogUpdate
14.0.0.3418

Malwarebytes
PUP.Optional.HDQuality.A
v2014.08.12.11

McAfee
Artemis!A8997DBCACC7
5600.6991

Panda Antivirus
Trj/Genetic.gen
14.08.12.11

Qihoo 360 Security
Win32/Trojan.Multi.daf
1.0.0.1015

Reason Heuristics
PUP.MotokoGroup.g
14.8.12.10

Sophos
Generic PUA GI
4.98

VIPRE Antivirus
Threat.4789396
31208

File size:
608.9 KB (623,464 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2016

Original file name:
HD_Quality_v1.1.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\hd_quality_v1.1\1ac07856-f877-4669-b64e-c6c8da3fb7b2-6.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
7/18/2014 10:00:00 AM

Valid to:
7/19/2015 9:59:59 AM

Subject:
CN=Motoko Group, O=Motoko Group, STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00AAFC4F8011F7FD7C00748C990950D28A

File PE Metadata
Compilation timestamp:
7/28/2014 9:10:55 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
12288:Y5q9hKlgXXUoHhksvw+W2yPWoN2UNLlcspTTY+jk6mRTqEJx7:+qOleK9VezUNL+AT8+4TqEv7

Entry address:
0x48B0C

Entry point:
E8, 5B, DF, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 58, E3, 47, 00, E8, DE, 4E, 00, 00, E8, 9A, 29, 00, 00, 0F, B7, F0, 6A, 02, E8, EE, DE, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, 9A, 67, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Entropy:
6.3467

Code size:
432 KB (442,368 bytes)

Scheduled Task
Task name:
1ac07856-f877-4669-b64e-c6c8da3fb7b2-6

Trigger:
Logon (Runs on logon)

Action:
1ac07856-f877-4669-b64e-c6c8da3fb7b2-6.exe \iuxorwrzw='hd_quality_v1.1' \qyfallvcr=61768 \dcy


Remove 1ac07856-f877-4669-b64e-c6c8da3fb7b2-6.exe - Powered by Reason Core Security