3df80c00-3cc9-4e58-9c93-97ab8032ba20-4.exe

Wifi Protector BI

Robokid Technologies

By using the Crossrider framework, this web extension is loaded in the web browser and displays advertisments on web pages not affiliated by the extension or company. These unwanted advertisements are injected by the extension in the browser in the form of common ad types such as banners and text-links. The application 3df80c00-3cc9-4e58-9c93-97ab8032ba20-4.exe, “Wifi Protector BI exe” by Robokid Technologies has been detected as adware by 13 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. It is built using the Crossrider cross-browser extension toolkit. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider. It is part of the Brightcircle group of web-extensions that inject advertisements in the browser.
Publisher:
WFprotect  (signed by Robokid Technologies)

Product:
Wifi Protector BI

Description:
Wifi Protector BI exe

Version:
1000.1000.1000.1000

MD5:
969aa326b4e40c8d5dfc306e9df287a6

SHA-1:
e14f9a393ff2a9b835733ff993e348c585de6c17

SHA-256:
3e1ccbe7c43a6ce5d90cc132c6997840bd6908593c100afcfefaba14f4e45d0d

Scanner detections:
13 / 68

Status:
Adware

Explanation:
May modify the web browser's settings including changing the homepage and search provider in addition to delivering ads (by injecting banner and text-links directly in the webpage).

Analysis date:
4/26/2024 5:16:04 PM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
ADWARE/CrossRider.Gen2
7.11.163.22

AVG
Generic
2015.0.3404

Baidu Antivirus
Adware.Win32.CrossRider
4.0.3.14723

ESET NOD32
Win32/Toolbar.CrossRider.AK (variant)
8.10127

Fortinet FortiGate
Riskware/Toolbar_CrossRider
7/27/2014

Malwarebytes
PUP.Optional.ObjectBrowser.A
v2014.07.27.01

McAfee
Artemis!024A288B69DF
5600.7057

Panda Antivirus
Trj/Genetic.gen
14.07.23.12

Qihoo 360 Security
HEUR/Malware.QVM10.Gen
1.0.0.1015

Reason Heuristics
PUP.RobokidTechnologies.g
14.7.23.12

Sophos
AppRider
4.98

Trend Micro House Call
Suspicious_GEN.F47V0717
7.2.208

VIPRE Antivirus
Crossrider
31454

File size:
866 KB (886,808 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
Wifi Protector BI.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\wifi protector bi\3df80c00-3cc9-4e58-9c93-97ab8032ba20-4.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
6/22/2014 7:00:00 PM

Valid to:
6/23/2015 6:59:59 PM

Subject:
CN=Robokid Technologies, O=Robokid Technologies, STREET=Athinodorou 3 Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00ECF35E880AD0F3BC6F82DFB1F2E84CC0

File PE Metadata
Compilation timestamp:
7/16/2014 5:13:36 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
12288:ABb5E8mPxEuspcXQWFtxxTXbJ6wDMH4aXoP7zywQwAOpCdwKpTHul:ABN/zvWAWFtxxTrR7rLpITM

Entry address:
0x8DF5F

Entry point:
E8, 75, E3, 00, 00, E9, 7F, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, 8B, 4C, 24, 04, F7, C1, 03, 00, 00, 00, 74, 24, 8A, 01, 83, C1, 01, 84, C0, 74, 4E, F7, C1, 03, 00, 00, 00, 75, EF, 05, 00, 00, 00, 00, 8D, A4, 24, 00, 00, 00, 00, 8D, A4, 24, 00, 00, 00, 00, 8B, 01, BA, FF, FE, FE, 7E, 03, D0, 83, F0, FF, 33, C2, 83, C1, 04, A9, 00, 01, 01, 81, 74, E8, 8B, 41, FC, 84, C0, 74, 32, 84, E4, 74, 24, A9, 00, 00, FF, 00, 74, 13, A9, 00, 00, 00, FF, 74, 02, EB, CD, 8D, 41, FF, 8B, 4C, 24, 04, 2B, C1, C3, 8D, 41...
 
[+]

Code size:
715 KB (732,160 bytes)

Scheduled Task
Task name:
3df80c00-3cc9-4e58-9c93-97ab8032ba20-4

Trigger:
Logon (Runs on logon)

Action:
3df80c00-3cc9-4e58-9c93-97ab8032ba20-4.exe \opqpseaa \cvajrsxgu='wifi protector bi' \hnfful


Remove 3df80c00-3cc9-4e58-9c93-97ab8032ba20-4.exe - Powered by Reason Core Security