7eb8ed62-d553-45c0-a24c-e7ea58d03cb6-2.exe

Browseri_Appe 1.2

Robokid Technologies

By using the Crossrider framework, this web extension is loaded in the web browser and displays advertisments on web pages not affiliated by the extension or company. These unwanted advertisements are injected by the extension in the browser in the form of common ad types such as banners and text-links. The application 7eb8ed62-d553-45c0-a24c-e7ea58d03cb6-2.exe, “Browseri_Appe 1.2 exe” by Robokid Technologies has been detected as adware by 14 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. It is built using the Crossrider cross-browser extension platform. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider. It is distributed as part of the Brightcircle group of browser-extensions.
Publisher:
app  (signed by Robokid Technologies)

Product:
Browseri_Appe 1.2

Description:
Browseri_Appe 1.2 exe

Version:
1000.1000.1000.1000

MD5:
ff43028e6cc68db6d4ae6c680f7a78ef

SHA-1:
9fd55e2ced905fdf832f689356d14fb3bbc8920e

SHA-256:
be7d5cef1d25f42efb32bee27c84e079be4e6456a3b3c9ac9469d23af0bfddb1

Scanner detections:
14 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements. Distributed through the Brightcircle investments brand.

Analysis date:
4/18/2024 5:14:14 PM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
ADWARE/CrossRider.Gen2
7.11.163.92

AVG
Generic
2015.0.3406

Baidu Antivirus
Adware.Win32.CrossRider
4.0.3.14722

ESET NOD32
Win32/Toolbar.CrossRider.AJ potentially unwanted application
7.0.302.0

F-Prot
W32/A-eb9ef301
v6.4.7.1.166

IKARUS anti.virus
AdWare.Adload
t3scan.1.6.1.0

Malwarebytes
PUP.Optional.Crossrider.T
v2014.07.22.11

NANO AntiVirus
Riskware.Win32.CrossRider.dcunoy
0.28.2.60990

Panda Antivirus
Trj/Genetic.gen
14.07.22.11

Qihoo 360 Security
HEUR/Malware.QVM10.Gen
1.0.0.1015

Reason Heuristics
PUP.RobokidTechnologies.g
14.7.22.10

Rising Antivirus
PE:Malware.Obscure!1.9C59
23.00.65.14720

Sophos
AppRider
4.98

VIPRE Antivirus
Threat.4789396
31208

File size:
391 KB (400,408 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
Browseri_Appe 1.2.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\browseri_appe 1.2\7eb8ed62-d553-45c0-a24c-e7ea58d03cb6-2.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
6/23/2014 2:00:00 AM

Valid to:
6/24/2015 1:59:59 AM

Subject:
CN=Robokid Technologies, O=Robokid Technologies, STREET=Athinodorou 3 Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00ECF35E880AD0F3BC6F82DFB1F2E84CC0

File PE Metadata
Compilation timestamp:
7/22/2014 12:08:20 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
6144:dte6rE/DcJWoSdgrh8mXqc8kIUBT1pTBMhZLGljrFSQz2:dte6Q/IJW6SmXqc8kzT1pTCL

Entry address:
0x30291

Entry point:
E8, 7E, 8F, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 38, E3, 45, 00, E8, 09, 25, 00, 00, E8, 89, 16, 00, 00, 0F, B7, F0, 6A, 02, E8, 11, 8F, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, B7, 62, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Code size:
301 KB (308,224 bytes)

Scheduled Task
Task name:
7eb8ed62-d553-45c0-a24c-e7ea58d03cb6-2

Trigger:
Logon (Runs on logon)

Action:
7eb8ed62-d553-45c0-a24c-e7ea58d03cb6-2.exe \cdrtr \lnktg='browseri_appe 1.2' \ojhxgn=60346 \b


Remove 7eb8ed62-d553-45c0-a24c-e7ea58d03cb6-2.exe - Powered by Reason Core Security