fb7e5448-8e71-4d24-8bff-c1166cac376e.exe

Torpedo

Magne­sium Play Apps

This adware is a web browser extension that will inject advertising in the browser in the form of unwanted banners and text-links which may link to malware sites and install unwanted software. The application fb7e5448-8e71-4d24-8bff-c1166cac376e.exe by Magne­sium Play Apps has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. It is part of the Brightcircle group of web-extensions that inject advertisements in the browser.
Publisher:
Magne­sium Play Apps  (signed and verified)

Product:
Torpedo

Version:
1.0.0.0

MD5:
8bd1d400efd2e33a31d6b06615aac65b

SHA-1:
5c942e7b9d714256f24e0bacee117d81994ecba0

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
12/6/2019 7:29:00 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Brightcircle.Task
17.2.22.21

File size:
31.4 KB (32,168 bytes)

Product version:
1.0.0.0

Copyright:
Copyright © 2014

Original file name:
TorpedoCh.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\Program Files\theveehd plugin v10\fb7e5448-8e71-4d24-8bff-c1166cac376e.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
8/27/2014 5:00:00 PM

Valid to:
8/28/2015 4:59:59 PM

Subject:
CN=Magne­sium Play Apps, O=Magne­sium Play Apps, STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
0085BAD4AB3BC6504E824183F7EA00BCA6

File PE Metadata
Compilation timestamp:
8/18/2014 5:08:19 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

Entry address:
0x81EE

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 02, 00, 10, 00, 00, 00, 20, 00, 00, 80, 18, 00, 00, 00, 38, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 01, 00, 00, 00, 50, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 01, 00, 00, 00, 68, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 00, 00, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
5.4657

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
24.5 KB (25,088 bytes)

Scheduled Task
Task name:
fb7e5448-8e71-4d24-8bff-c1166cac376e

Path:
C:\WINDOWS\Tasks\fb7e5448-8e71-4d24-8bff-c1166cac376e.job

Trigger:
Logon (Runs on logon)


Remove fb7e5448-8e71-4d24-8bff-c1166cac376e.exe - Powered by Reason Core Security