a0da416f-ca27-40ed-b15f-2f98e10780ea-10.exe

HD-V1.9

Robokid Technologies

By using the Crossrider framework, this web extension is loaded in the web browser and displays advertisments on web pages not affiliated by the extension or company. These unwanted advertisements are injected by the extension in the browser in the form of common ad types such as banners and text-links. The application a0da416f-ca27-40ed-b15f-2f98e10780ea-10.exe by Robokid Technologies has been detected as adware by 7 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. It is part of the Brightcircle group of web-extensions that inject advertisements in the browser.
Publisher:
InfoHD-V1.8  (signed by Robokid Technologies)

Product:
HD-V1.9

Description:
HD-V1.9 exe

Version:
1000.1000.1000.1000

MD5:
7d08f66a960cc6d0fa52c3b8fdf582ac

SHA-1:
49f5c76ac349782da24e6047165a194cb47ae20f

SHA-256:
47e373b7d48a01e8ce2fc40ce96f718d59b9200795397f75d130a1ab5fe7f0d3

Scanner detections:
7 / 68

Status:
Adware

Explanation:
May modify the web browser's settings including changing the homepage and search provider in addition to delivering ads (by injecting banner and text-links directly in the webpage).

Analysis date:
4/23/2024 4:04:01 PM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
ADWARE/CrossRider.Gen2
7.11.163.86

AVG
Generic
2015.0.3406

Baidu Antivirus
Adware.Win32.CrossRider
4.0.3.14722

ESET NOD32
Win32/Toolbar.CrossRider.AG potentially unwanted application
7.0.302.0

IKARUS anti.virus
AdWare.Adload
t3scan.1.6.1.0

Reason Heuristics
PUP.RobokidTechnologies.h
14.7.22.7

VIPRE Antivirus
Threat.4789396
31208

File size:
365 KB (373,784 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
HD-V1.9.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\hd-v1.9\a0da416f-ca27-40ed-b15f-2f98e10780ea-10.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
6/23/2014 3:00:00 AM

Valid to:
6/24/2015 2:59:59 AM

Subject:
CN=Robokid Technologies, O=Robokid Technologies, STREET=Athinodorou 3 Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00ECF35E880AD0F3BC6F82DFB1F2E84CC0

File PE Metadata
Compilation timestamp:
7/21/2014 1:02:40 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
6144:gkNu5reV9Ig34tPLhZVGOO28asumpTBOVq/2dGo:gkND2ZLTVGO/8zumpToh

Entry address:
0x2860B

Entry point:
E8, 4D, AD, 00, 00, E9, 7F, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 57, 56, 53, 33, FF, 8B, 44, 24, 14, 0B, C0, 7D, 14, 47, 8B, 54, 24, 10, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 14, 89, 54, 24, 10, 8B, 44, 24, 1C, 0B, C0, 7D, 14, 47, 8B, 54, 24, 18, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 1C, 89, 54, 24, 18, 0B, C0, 75, 18, 8B, 4C, 24, 18, 8B, 44, 24, 14, 33, D2, F7, F1, 8B, D8, 8B, 44, 24, 10, F7, F1, 8B, D3, EB, 41, 8B, D8, 8B, 4C, 24, 18, 8B, 54, 24, 14, 8B, 44, 24, 10, D1, EB, D1, D9...
 
[+]

Code size:
272.5 KB (279,040 bytes)

Scheduled Task
Task name:
a0da416f-ca27-40ed-b15f-2f98e10780ea-10

Trigger:
Logon (Runs on logon)

Action:
a0da416f-ca27-40ed-b15f-2f98e10780ea-10.exe \ljjurumrz='hd-v1.9' \rprthbsn=59568 \apxwjmsep='0


Remove a0da416f-ca27-40ed-b15f-2f98e10780ea-10.exe - Powered by Reason Core Security