f2432e77-1bc6-47d5-9f07-ad149f840a41-11.exe

HDtubeV1.6

Robokid Technologies

By using the Crossrider framework, this web extension is loaded in the web browser and displays advertisments on web pages not affiliated by the extension or company. These unwanted advertisements are injected by the extension in the browser in the form of common ad types such as banners and text-links. The application f2432e77-1bc6-47d5-9f07-ad149f840a41-11.exe by Robokid Technologies has been detected as adware by 15 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. It is built using the Crossrider cross-browser extension platform. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider. It is distributed as part of the Brightcircle group of browser-extensions.
Publisher:
HDTube  (signed by Robokid Technologies)

Product:
HDtubeV1.6

Description:
HDtubeV1.6 exe

Version:
1000.1000.1000.1000

MD5:
07c5cf211e2cc468b1a3bc131fcd720c

SHA-1:
66e5fc317ca9225401cc4550958a8f4ff078fbcb

SHA-256:
27086d6f2d55c112c827d4ff2bc7fd6741ae2e8c29a204c89614f3d30b86767d

Scanner detections:
15 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements. Distributed through the Brightcircle investments brand.

Analysis date:
5/7/2024 4:33:51 PM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
Adware/CrossRider.A.15749
7.11.158.214

AVG
Generic
2015.0.3367

Baidu Antivirus
Adware.Win32.CrossRider
4.0.3.14829

Comodo Security
ApplicUnwnt
18804

ESET NOD32
Win32/Toolbar.CrossRider.AK (variant)
8.10061

Fortinet FortiGate
Riskware/Toolbar_CrossRider
8/29/2014

K7 AntiVirus
Trojan
13.180.12643

Malwarebytes
PUP.Optional.HDPlus.A
v2014.08.29.06

McAfee
Artemis!07C5CF211E2C
5600.7023

NANO AntiVirus
Riskware.Win32.AdLoad.dbxccs
0.28.0.60698

Panda Antivirus
Trj/Genetic.gen
14.08.29.06

Reason Heuristics
PUP.Crossrider.RobokidTechnologies.h
14.8.29.18

Sophos
Generic PUA GG
4.98

Trend Micro House Call
Suspicious_GEN.F47V0705
7.2.241

VIPRE Antivirus
Crossrider
31080

File size:
1.8 MB (1,886,232 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
HDtubeV1.6.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\hdtubev1.6\f2432e77-1bc6-47d5-9f07-ad149f840a41-11.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
6/23/2014 3:00:00 AM

Valid to:
6/24/2015 2:59:59 AM

Subject:
CN=Robokid Technologies, O=Robokid Technologies, STREET=Athinodorou 3 Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00ECF35E880AD0F3BC6F82DFB1F2E84CC0

File PE Metadata
Compilation timestamp:
7/1/2014 1:04:15 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
49152:h3wKGuv3n92uPCLqfiIfqopS5FTIUzn+nPRx0:eKxs2CLeK5

Entry address:
0xE1E14

Entry point:
E8, 43, 00, 01, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 56, 8B, 75, 08, 85, F6, 78, 09, E8, 76, 01, 01, 00, 3B, 30, 7C, 07, E8, 6D, 01, 01, 00, 8B, 30, E8, 60, 01, 01, 00, 8B, 04, B0, 5E, 5D, C3, 55, 8B, EC, 56, E8, 60, 5F, 00, 00, 8B, F0, 85, F6, 75, 07, B8, 00, F1, 53, 00, EB, 26, 53, 57, 33, FF, BB, 86, 00, 00, 00, 39, 7E, 24, 75, 1B, 6A, 01, 53, E8, 7A, 31, 00, 00, 59, 59, 89, 46, 24, 85, C0, 75, 0A, B8, 00, F1, 53, 00, 5F, 5B, 5E, 5D, C3, FF, 75, 08, 8B, 76, 24, E8, 90, FF, FF, FF, 50, 53, 56, E8, DA, ED...
 
[+]

Entropy:
6.8557

Code size:
1 MB (1,068,032 bytes)

Scheduled Task
Task name:
f2432e77-1bc6-47d5-9f07-ad149f840a41-11

Trigger:
Logon (Runs on logon)

Action:
f2432e77-1bc6-47d5-9f07-ad149f840a41-11.exe \oipmr=pojcj2htaz20q8a8az1gndaemyii2vmqz4e8lxdj\fl


Remove f2432e77-1bc6-47d5-9f07-ad149f840a41-11.exe - Powered by Reason Core Security