1pvddl0xmua==2.exe

The application 1pvddl0xmua==2.exe has been detected as a potentially unwanted program by 23 anti-malware scanners. It is built using the Crossrider cross-browser extension toolkit. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider. The file has been seen being downloaded from d1jpj265kni4hm.cloudfront.net.
MD5:
e1fa39259b5cd4bf66ff526513c3223d

SHA-1:
8b4c4764588f7bee13af7168c0c9b0e1ed13b27e

SHA-256:
175643cd57ccda8476bce108355582aec5eb350a728ad9f4bd51f58acc89040f

Scanner detections:
23 / 68

Status:
Potentially unwanted

Explanation:
May modify the web browser's settings including changing the homepage and search provider in addition to delivering ads (by injecting banner and text-links directly in the webpage).

Analysis date:
6/29/2025 6:34:27 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.GenericKD.2783107
456

Agnitum Outpost
PUA.Toolbar.CrossRider
7.1.1

AhnLab V3 Security
PUP/Win32.CrossRider
2015.10.28

Avira AntiVirus
ADWARE/CrossRider.10756
8.3.2.2

avast!
Win32:Malware-gen
2014.9-151105

AVG
Crossrider
2016.0.2934

Baidu Antivirus
Adware.Win32.CrossAd
4.0.3.15115

Bitdefender
Trojan.GenericKD.2783107
1.0.20.1545

Emsisoft Anti-Malware
Trojan.GenericKD.2783107
8.15.11.05.10

ESET NOD32
Win32/Toolbar.CrossRider.DC potentially unwanted (variant)
9.12472

Fortinet FortiGate
Riskware/CrossRider
11/5/2015

F-Secure
Trojan.GenericKD.2783107
11.2015-05-11_5

G Data
Trojan.GenericKD.2783107
15.11.25

IKARUS anti.virus
Trojan.SuspectCRC
t3scan.1.9.5.0

K7 AntiVirus
Adware
13.212.17663

Kaspersky
UDS:DangerousObject.Multi.Generic
14.0.0.1319

McAfee
RDN/Generic.grp
5600.6590

MicroWorld eScan
Trojan.GenericKD.2783107
16.0.0.927

nProtect
Trojan.GenericKD.2783107
15.10.27.01

Qihoo 360 Security
Win32/Trojan.Multi.daf
1.0.0.1015

Trend Micro
TROJ_GEN.R047C0OJI15
10.465.05

VIPRE Antivirus
Trojan.Win32.Generic
44846

Zillya! Antivirus
Downloader.LMN.Win32.386253
2.0.0.2477

File size:
10.5 KB (10,752 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\1pvddl0xmua==2.exe

File PE Metadata
Compilation timestamp:
9/30/2015 7:20:31 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
192:vZB79OiMkKkVHzk7KduaPXGUtZYGo8CDZpyDr8q916ADk:LoiMkdluVB84pyDr/iAD

Entry address:
0x1000

Entry point:
6A, 70, 68, 58, 23, 40, 00, E8, F8, 01, 00, 00, 33, DB, 89, 5D, FC, 8D, 45, 80, 50, FF, 15, 00, 20, 40, 00, 83, CF, FF, 89, 7D, FC, 66, 81, 3D, 00, 00, 40, 00, 4D, 5A, 75, 28, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, 17, 0F, B7, 88, 18, 00, 40, 00, 81, F9, 0B, 01, 00, 00, 74, 20, 81, F9, 0B, 02, 00, 00, 74, 05, 89, 5D, E4, EB, 2A, 83, B8, 84, 00, 40, 00, 0E, 76, F2, 33, C9, 39, 98, F8, 00, 40, 00, EB, 11, 83, B8, 74, 00, 40, 00, 0E, 76, DF, 33, C9, 39, 98, E8, 00, 40, 00, 0F, 95, C1...
 
[+]

Entropy:
5.1209

Developed / compiled with:
Microsoft Visual C++ v7.1

Code size:
3 KB (3,072 bytes)

The file 1pvddl0xmua==2.exe has been seen being distributed by the following URL.

Remove 1pvddl0xmua==2.exe - Powered by Reason Core Security