a02cb170-9fe9-4990-b250-a3c4f2925fe6-10.exe

MediaPlayersvideos 1.1

Xenon Play Center

This adware is a web browser extension that will inject advertising in the browser in the form of unwanted banners and text-links which may link to malware sites and install unwanted software. The application a02cb170-9fe9-4990-b250-a3c4f2925fe6-10.exe, “MediaPlayersvideos 1.1 exe” by Xenon Play Center has been detected as adware by 10 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. It is built using the Crossrider cross-browser extension toolkit. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider. It is part of the Brightcircle group of web-extensions that inject advertisements in the browser.
Publisher:
Enter  (signed by Xenon Play Center)

Product:
MediaPlayersvideos 1.1

Description:
MediaPlayersvideos 1.1 exe

Version:
1000.1000.1000.1000

MD5:
7343a8029967d2fcf358ab750f9a50bd

SHA-1:
5b1d54cab1d817a8e205f6f0d6f96e42946e2fc7

SHA-256:
852ad35db0fc796f91fc4fa32ced6f04d00de73266ca6de0f0e431a24c395e21

Scanner detections:
10 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Analysis date:
4/18/2024 2:29:53 AM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
Adware/CrossRider.KG
7.11.188.194

Baidu Antivirus
PUA.Win32.CrossRider
4.0.3.141125

ESET NOD32
Win32/Toolbar.CrossRider.BM potentially unwanted application
7.0.302.0

G Data
Win32.Adware.Crossrider
14.11.24

IKARUS anti.virus
Trojan.GoogUpdate
t3scan.1.8.3.0

Malwarebytes
PUP.Optional.MediaPlayersVideos.A
v2014.11.25.01

Panda Antivirus
Trj/Genetic.gen
14.11.25.01

Qihoo 360 Security
Win32/Virus.Adware.6c3
1.0.0.1015

Reason Heuristics
PUP.Crossrider.Task.h
14.11.29.20

VIPRE Antivirus
Threat.4789396
35088

File size:
695.4 KB (712,096 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
MediaPlayersvideos 1.1.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\mediaplayersvideos 1.1\a02cb170-9fe9-4990-b250-a3c4f2925fe6-10.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
10/19/2014 7:00:00 PM

Valid to:
10/20/2015 6:59:59 PM

Subject:
CN=Xenon Play Center, O=Xenon Play Center, STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
69BADB8E273451C7DEA87ADDB50705F2

File PE Metadata
Compilation timestamp:
11/25/2014 7:21:11 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
12288:Cdu0aI2e2XsBTQtFRRGakfP1GE8DVsRc4pT06dNzIt5zXpU:Cdu08e28Qt1kFFVTDEHXu

Entry address:
0x54EF9

Entry point:
E8, 0A, DB, 00, 00, E9, 7F, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 57, 56, 8B, 74, 24, 10, 8B, 4C, 24, 14, 8B, 7C, 24, 0C, 8B, C1, 8B, D1, 03, C6, 3B, FE, 76, 08, 3B, F8, 0F, 82, 68, 03, 00, 00, 0F, BA, 25, 00, D5, 49, 00, 01, 73, 07, F3, A4, E9, 17, 03, 00, 00, 81, F9, 80, 00, 00, 00, 0F, 82, CE, 01, 00, 00, 8B, C7, 33, C6, A9, 0F, 00, 00, 00, 75, 0E, 0F, BA, 25, 88, A6, 49, 00, 01, 0F, 82, DA, 04, 00, 00, 0F, BA, 25, 00, D5, 49, 00, 00, 0F, 83, A7, 01, 00, 00, F7, C7, 03, 00, 00...
 
[+]

Entropy:
6.3880

Code size:
502 KB (514,048 bytes)

Scheduled Task
Task name:
a02cb170-9fe9-4990-b250-a3c4f2925fe6-10_user

Trigger:
Logon (Runs on logon)

Action:
a02cb170-9fe9-4990-b250-a3c4f2925fe6-10.exe \crregname='mediaplayersvideos 1.1' \appid='67913


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to s3-website-us-east-1.amazonaws.com  (52.216.65.130:80)

TCP (HTTP):
Connects to server-54-192-55-92.jfk6.r.cloudfront.net  (54.192.55.92:80)

TCP (HTTP):
Connects to server-54-192-55-27.jfk6.r.cloudfront.net  (54.192.55.27:80)

TCP (HTTP):
Connects to server-54-192-55-179.jfk6.r.cloudfront.net  (54.192.55.179:80)

TCP (HTTP):
Connects to server-54-192-55-14.jfk6.r.cloudfront.net  (54.192.55.14:80)

Remove a02cb170-9fe9-4990-b250-a3c4f2925fe6-10.exe - Powered by Reason Core Security