bb57d35d-458c-4fbd-aa09-d9bd7e8c8da9-2.exe

P-HD-V1.4

Motoko Group

This adware utilizes the Crossrider extension platform and will inject advertisiments in the Internet browser and may modify core browser settings. Ads will be delivered as banners and contextual text-links and may promote other potentially unwanted software. The application bb57d35d-458c-4fbd-aa09-d9bd7e8c8da9-2.exe by Motoko Group has been detected as adware by 19 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. It is built using the Crossrider cross-browser extension toolkit. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider. It is part of the Brightcircle group of web-extensions that inject advertisements in the browser.
Publisher:
P-HD  (signed by Motoko Group)

Product:
P-HD-V1.4

Description:
P-HD-V1.4 exe

Version:
1000.1000.1000.1000

MD5:
ff71d0a43f65712fd0f2b55fe4538db9

SHA-1:
9398ec86bf70d754a30e6343a39145343de9a01f

SHA-256:
00a8113a585b98a4605187289d20d89184d6c51ea82873dfbf77be90ee65267b

Scanner detections:
19 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Analysis date:
4/19/2024 1:03:30 AM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
ADWARE/CrossRider.Gen2
7.11.166.212

avast!
Win32:Adware-gen [Adw]
2014.9-140731

AVG
Generic
2015.0.3396

Dr.Web
Trojan.Crossrider.27395
9.0.1.0253

ESET NOD32
Win32/Toolbar.CrossRider.AJ potentially unwanted application
8.7.0.302.0

Fortinet FortiGate
W32/GoogUpdate.AJ!tr
7/31/2014

F-Prot
W32/A-eb9ef301
v6.4.7.1.166

IKARUS anti.virus
PUA.CrossRider
t3scan.1.6.1.0

Kaspersky
Trojan.NSIS.GoogUpdate
14.0.0.3477

Malwarebytes
PUP.Optional.HDQuality.A
v2014.07.31.01

McAfee
Artemis!FF71D0A43F65
5600.7052

NANO AntiVirus
Trojan.Win32.Crossrider.ddsuvx
0.28.2.61519

Panda Antivirus
Trj/Genetic.gen
14.07.31.01

Qihoo 360 Security
Malware.QVM10.Gen
1.0.0.1015

Reason Heuristics
PUP.MotokoGroup.g
14.7.31.13

Rising Antivirus
PE:Malware.Obscure!1.9C59
23.00.65.14729

Sophos
AppRider
4.98

VIPRE Antivirus
Threat.4789396
31208

File size:
369.9 KB (378,728 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
P-HD-V1.4.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\p-hd-v1.4\bb57d35d-458c-4fbd-aa09-d9bd7e8c8da9-2.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
7/18/2014 4:00:00 AM

Valid to:
7/19/2015 3:59:59 AM

Subject:
CN=Motoko Group, O=Motoko Group, STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00AAFC4F8011F7FD7C00748C990950D28A

File PE Metadata
Compilation timestamp:
7/28/2014 3:09:18 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
6144:OEbJa5Bqm70pu7rBvl8PfqBtCApTBxoTGSC:OEbJaV70p6rheqBtCApTwK

Entry address:
0x2E5C1

Entry point:
E8, 7E, 8F, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, C0, 7B, 45, 00, E8, 09, 25, 00, 00, E8, 89, 16, 00, 00, 0F, B7, F0, 6A, 02, E8, 11, 8F, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, B7, 62, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Entropy:
6.4583

Code size:
279 KB (285,696 bytes)

Scheduled Task
Task name:
bb57d35d-458c-4fbd-aa09-d9bd7e8c8da9-2

Trigger:
Logon (Runs on logon)

Action:
bb57d35d-458c-4fbd-aa09-d9bd7e8c8da9-2.exe \fpewjbe \iuxorwrzw='p-hd-v1.4' \qyfallvcr=61764 \


Remove bb57d35d-458c-4fbd-aa09-d9bd7e8c8da9-2.exe - Powered by Reason Core Security