bb57d35d-458c-4fbd-aa09-d9bd7e8c8da9-6.exe

P-HD-V1.4

Motoko Group

This adware utilizes the Crossrider extension platform and will inject advertisiments in the Internet browser and may modify core browser settings. Ads will be delivered as banners and contextual text-links and may promote other potentially unwanted software. The application bb57d35d-458c-4fbd-aa09-d9bd7e8c8da9-6.exe by Motoko Group has been detected as adware by 17 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. It is built using the Crossrider cross-browser extension toolkit. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider. It is part of the Brightcircle group of web-extensions that inject advertisements in the browser.
Publisher:
P-HD  (signed by Motoko Group)

Product:
P-HD-V1.4

Description:
P-HD-V1.4 exe

Version:
1000.1000.1000.1000

MD5:
a8997dbcacc7417a1a057eb61de47413

SHA-1:
68348e8dd41b39cfbe74a172090d4facec452d6e

SHA-256:
5f831d4e417389111182ef9c8b06709613b0ee193a8ef7b43ca77a700fc4cbca

Scanner detections:
17 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Analysis date:
4/24/2024 5:03:21 AM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
PUP/Win32.Toolbar
2014.08.13

Avira AntiVirus
ADWARE/CrossRider.Gen2
7.11.166.212

AVG
Generic
2015.0.3396

Dr.Web
Trojan.Crossrider.27748
9.0.1.0253

ESET NOD32
Win32/Toolbar.CrossRider.AE potentially unwanted application
8.7.0.302.0

Fortinet FortiGate
W32/GoogUpdate.AE!tr
7/31/2014

F-Prot
W32/A-7d811582
v6.4.7.1.166

IKARUS anti.virus
PUA.PlusHD
t3scan.1.6.1.0

Kaspersky
Trojan.NSIS.GoogUpdate
14.0.0.3477

Malwarebytes
PUP.Optional.HDQuality.A
v2014.07.31.01

McAfee
Artemis!A8997DBCACC7
5600.7052

Panda Antivirus
Trj/Genetic.gen
14.07.31.01

Qihoo 360 Security
Win32/Trojan.Multi.daf
1.0.0.1015

Reason Heuristics
PUP.MotokoGroup.g
14.7.31.13

Sophos
Generic PUA GI
4.98

VIPRE Antivirus
Threat.4789396
31208

File size:
608.9 KB (623,464 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2016

Original file name:
P-HD-V1.4.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\p-hd-v1.4\bb57d35d-458c-4fbd-aa09-d9bd7e8c8da9-6.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
7/18/2014 4:00:00 AM

Valid to:
7/19/2015 3:59:59 AM

Subject:
CN=Motoko Group, O=Motoko Group, STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00AAFC4F8011F7FD7C00748C990950D28A

File PE Metadata
Compilation timestamp:
7/28/2014 3:10:55 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
12288:D5q9hKlgXXUoHhksvw+W2yPWoN2UNLlcspTTY+jkbmRTqEJxE:tqOleK9VezUNL+AT8+/TqEvE

Entry address:
0x48B0C

Entry point:
E8, 5B, DF, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 58, E3, 47, 00, E8, DE, 4E, 00, 00, E8, 9A, 29, 00, 00, 0F, B7, F0, 6A, 02, E8, EE, DE, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, 9A, 67, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Entropy:
6.3463

Code size:
432 KB (442,368 bytes)

Scheduled Task
Task name:
bb57d35d-458c-4fbd-aa09-d9bd7e8c8da9-6

Trigger:
Logon (Runs on logon)

Action:
bb57d35d-458c-4fbd-aa09-d9bd7e8c8da9-6.exe \iuxorwrzw='p-hd-v1.4' \qyfallvcr=61764 \dcyrj='00


Remove bb57d35d-458c-4fbd-aa09-d9bd7e8c8da9-6.exe - Powered by Reason Core Security