57f70c69-f58a-42b2-acb9-65750a7eaa97-2.exe

Robokid Technologies

By using the Crossrider framework, this web extension is loaded in the web browser and displays advertisments on web pages not affiliated by the extension or company. These unwanted advertisements are injected by the extension in the browser in the form of common ad types such as banners and text-links. The application 57f70c69-f58a-42b2-acb9-65750a7eaa97-2.exe by Robokid Technologies has been detected as adware by 13 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. It is distributed as part of the Brightcircle group of browser-extensions.
Publisher:
HD-V9.4  (signed by Robokid Technologies)

Product:
HD-V9.4

Description:
HD-V9.4 exe

Version:
1000.1000.1000.1000

MD5:
c4939489338186c54b31ee08521d5980

SHA-1:
2487629376b2593e069b61c96a5179e356b24a09

SHA-256:
18f3624151e68836e814d3c92a6637a4baf56f019aa06e3b1cce695053a5b451

Scanner detections:
13 / 68

Status:
Adware

Explanation:
May modify the web browser's settings including changing the homepage and search provider in addition to delivering ads (by injecting banner and text-links directly in the webpage). Distributed through the Brightcircle investments brand.

Analysis date:
4/26/2024 7:36:39 AM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
ADWARE/CrossRider.Gen2
7.11.163.246

AVG
Generic
2015.0.3402

Baidu Antivirus
Adware.Win32.CrossRider
4.0.3.14725

ESET NOD32
Win32/Toolbar.CrossRider.AJ potentially unwanted application
7.0.302.0

F-Prot
W32/A-eb9ef301
v6.4.7.1.166

IKARUS anti.virus
not-a-virus:WebToolbar.CrossRider
t3scan.1.6.1.0

Malwarebytes
PUP.Optional.ObjectBrowser.A
v2014.08.03.11

Panda Antivirus
Trj/Genetic.gen
14.07.25.01

Qihoo 360 Security
HEUR/Malware.QVM10.Gen
1.0.0.1015

Reason Heuristics
PUP.RobokidTechnologies.g
14.7.25.13

Rising Antivirus
PE:Malware.Obscure!1.9C59
23.00.65.14723

Sophos
AppRider
4.98

VIPRE Antivirus
Threat.4789396
31208

File size:
378.5 KB (387,608 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
HD-V9.4.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\hd-v9.4\57f70c69-f58a-42b2-acb9-65750a7eaa97-2.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
6/23/2014 5:30:00 AM

Valid to:
6/24/2015 5:29:59 AM

Subject:
CN=Robokid Technologies, O=Robokid Technologies, STREET=Athinodorou 3 Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00ECF35E880AD0F3BC6F82DFB1F2E84CC0

File PE Metadata
Compilation timestamp:
7/20/2014 3:34:05 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
6144:SEDsA7O6xgcj3yVW5/0+0xydnS+lvMjD3pTB4xgfGcm0:SEDsAy62cGkN0+ZnS+lvMv3pTSG

Entry address:
0x2F471

Entry point:
E8, 7E, 8F, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 68, AF, 45, 00, E8, 09, 25, 00, 00, E8, 89, 16, 00, 00, 0F, B7, F0, 6A, 02, E8, 11, 8F, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, 6A, 60, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Entropy:
6.4434

Code size:
289.5 KB (296,448 bytes)

Scheduled Task
Task name:
57f70c69-f58a-42b2-acb9-65750a7eaa97-2

Trigger:
Logon (Runs on logon)

Action:
57f70c69-f58a-42b2-acb9-65750a7eaa97-2.exe \xbrjbvajf \ivgkdm='hd-v9.4' \sywcxnlqn=53164 \ipm


Remove 57f70c69-f58a-42b2-acb9-65750a7eaa97-2.exe - Powered by Reason Core Security