f2432e77-1bc6-47d5-9f07-ad149f840a41-4.exe

HDtubeV1.6

Robokid Technologies

By using the Crossrider framework, this web extension is loaded in the web browser and displays advertisments on web pages not affiliated by the extension or company. These unwanted advertisements are injected by the extension in the browser in the form of common ad types such as banners and text-links. The application f2432e77-1bc6-47d5-9f07-ad149f840a41-4.exe by Robokid Technologies has been detected as adware by 14 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. It is built using the Crossrider cross-browser extension toolkit. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider. It is part of the Brightcircle group of web-extensions that inject advertisements in the browser.
Publisher:
HDTube  (signed by Robokid Technologies)

Product:
HDtubeV1.6

Description:
HDtubeV1.6 exe

Version:
1000.1000.1000.1000

MD5:
49b7fcc30a8a46b60de3aaba3e2441d5

SHA-1:
82cdd94859410b876af38ad29128b9d89cfe59e8

SHA-256:
a7b7e8d6b3c1cd044d31c61b0960978eafa9fb5d53e976bb6d6e5bc1488708bd

Scanner detections:
14 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Analysis date:
4/24/2024 1:58:17 PM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
Adware/CrossRider.A.15578
7.11.158.214

AVG
Generic
2015.0.3367

Baidu Antivirus
Adware.Win32.CrossRider
4.0.3.14829

Comodo Security
ApplicUnwnt
18804

ESET NOD32
Win32/Toolbar.CrossRider.AK (variant)
8.10061

Fortinet FortiGate
Riskware/Toolbar_CrossRider
8/29/2014

K7 AntiVirus
Trojan
13.180.12643

Malwarebytes
PUP.Optional.HDPlus.A
v2014.08.29.06

McAfee
Artemis!49B7FCC30A8A
5600.7023

NANO AntiVirus
Riskware.Win32.AdLoad.dbywqi
0.28.0.60698

Qihoo 360 Security
Win32/Virus.Adware.611
1.0.0.1015

Reason Heuristics
PUP.Crossrider.RobokidTechnologies.g
14.8.29.18

Trend Micro House Call
Suspicious_GEN.F47V0705
7.2.241

VIPRE Antivirus
Crossrider
31080

File size:
803.5 KB (822,808 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
HDtubeV1.6.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\hdtubev1.6\f2432e77-1bc6-47d5-9f07-ad149f840a41-4.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
6/23/2014 3:00:00 AM

Valid to:
6/24/2015 2:59:59 AM

Subject:
CN=Robokid Technologies, O=Robokid Technologies, STREET=Athinodorou 3 Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00ECF35E880AD0F3BC6F82DFB1F2E84CC0

File PE Metadata
Compilation timestamp:
7/1/2014 1:03:32 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
12288:g7Co2NhKnaJxxj6UkyaknkNxvo5hmhf27vX+/UAHN+2f/iFdw6pTRr:YCo2wQp6rknkNxvobW/JP/i5TF

Entry address:
0x85E3F

Entry point:
E8, 87, E3, 00, 00, E9, 7F, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, 8B, 4C, 24, 04, F7, C1, 03, 00, 00, 00, 74, 24, 8A, 01, 83, C1, 01, 84, C0, 74, 4E, F7, C1, 03, 00, 00, 00, 75, EF, 05, 00, 00, 00, 00, 8D, A4, 24, 00, 00, 00, 00, 8D, A4, 24, 00, 00, 00, 00, 8B, 01, BA, FF, FE, FE, 7E, 03, D0, 83, F0, FF, 33, C2, 83, C1, 04, A9, 00, 01, 01, 81, 74, E8, 8B, 41, FC, 84, C0, 74, 32, 84, E4, 74, 24, A9, 00, 00, FF, 00, 74, 13, A9, 00, 00, 00, FF, 74, 02, EB, CD, 8D, 41, FF, 8B, 4C, 24, 04, 2B, C1, C3, 8D, 41...
 
[+]

Entropy:
6.5388

Code size:
656.5 KB (672,256 bytes)

Scheduled Task
Task name:
f2432e77-1bc6-47d5-9f07-ad149f840a41-4

Trigger:
Logon (Runs on logon)

Action:
f2432e77-1bc6-47d5-9f07-ad149f840a41-4.exe \afqlwsxt \tmyzf='hdtubev1.6' \bnoksl='C:\program


Remove f2432e77-1bc6-47d5-9f07-ad149f840a41-4.exe - Powered by Reason Core Security