hd-v1.2-codedownloader.exe

HD-V1.2

Kimahri Software inc.

This adware uses the Crossrider platform to build and distribute this web browser advertising injection extension. Once installed in the browser it will hijack various browser settings (homepage, search) and may interfere and track behaviors as well as deliver ads. The application hd-v1.2-codedownloader.exe by Kimahri Software inc has been detected as adware by 28 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. Built using the Crossrider web brower toolkit the CodeDownloader component will automatically connnect to the remote API server and download additional code/components for HDproduct extension/toolbar. The component makes a number of requests to the host app-static.crossrider.com/plugins/.../monetization/monetizationLoader.js. It is distributed as part of the Brightcircle group of browser-extensions.
Publisher:
HDproduct  (signed by Kimahri Software inc.)

Product:
HD-V1.2

Description:
HD-V1.2 exe

Version:
1000.1000.1000.1000

MD5:
e8b160d23f8d6ed2cc98cb5585280053

SHA-1:
83678e3a5cea19a370598d7a17088597a3ccc7e9

SHA-256:
e09d25dc62b6a84ed0430baf1468b88c781f9c6d73c47c5237e0c38b1e148b72

Scanner detections:
28 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements. Distributed through the Brightcircle investments brand.

Note:
Crossrider is the owner of a platform that enables the creation of cross-browser extensions by developers but is not the owner of this detected application. The owner/publisher of this file is Kimahri Software inc..

Analysis date:
4/26/2024 4:02:31 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Kazy.374109
919

Agnitum Outpost
PUA.Toolbar.CrossRider
7.1.1

AhnLab V3 Security
PUP/Win32.PlusHD
2014.06.13

Avira AntiVirus
Adware/CrossRider.A.11041
7.11.155.242

avast!
Win32:Adware-gen [Adw]
2014.9-140731

AVG
Adware Generic_r
2015.0.3356

Baidu Antivirus
Adware.Win32.CrossRider
4.0.3.14731

Bitdefender
Gen:Variant.Adware.Kazy.374109
1.0.20.1060

Dr.Web
Trojan.Crossrider.950
9.0.1.0253

Emsisoft Anti-Malware
Gen:Variant.Adware.Kazy.374109
8.14.07.31.04

ESET NOD32
Win32/Toolbar.CrossRider.AJ (variant)
8.9976

Fortinet FortiGate
Riskware/Toolbar_CrossRider
9/10/2014

F-Secure
Gen:Variant.Adware.Kazy.374109
11.2014-31-07_5

G Data
Gen:Variant.Adware.Kazy.374109
14.7.24

IKARUS anti.virus
AdWare.CrossRider
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.177.12026

Malwarebytes
PUP.Optional.SavePass.A
v2014.09.10.09

McAfee
Artemis!8F43B84E70C2
5600.7053

MicroWorld eScan
Gen:Variant.Adware.Kazy.374109
15.0.0.636

NANO AntiVirus
Riskware.Win32.AdLoad.dbdvli
0.28.0.60253

Panda Antivirus
PUP/PlusHD
14.07.31.04

Qihoo 360 Security
HEUR/Malware.QVM10.Gen
1.0.0.1015

Reason Heuristics
PUP.Crossrider.KimahriSoftwareinc.V
14.7.31.3

Rising Antivirus
PE:Malware.Obscure!1.9C59
23.00.65.14729

Sophos
AppRider
4.98

Trend Micro House Call
TROJ_GEN.F47V0507
7.2.253

VIPRE Antivirus
Crossrider
30490

File size:
513.4 KB (525,672 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
HD-V1.2.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\hd-v1.2\hd-v1.2-codedownloader.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
3/6/2013 9:00:00 PM

Valid to:
3/6/2016 8:59:59 PM

Subject:
CN=Kimahri Software inc., O=Kimahri Software inc., STREET=666 Sherbrooke Rue w, L=Montreal, S=Quebec, PostalCode=H3A 1E7, C=CA

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00A1BB8569950C0B2080A11A0E2F618B33

File PE Metadata
Compilation timestamp:
6/18/2014 7:03:48 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
6144:YOTaNwcwm63ZwmcbacLBw6/OxALnCAo0Ta7Ah9WPwSy/HpTBp0vJ6xhb:bT+fwFumcbB9L60T4wtfpTnf

Entry address:
0x443E8

Entry point:
E8, 2A, CB, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, B8, B4, 47, 00, E8, 02, 4A, 00, 00, E8, 76, 1D, 00, 00, 0F, B7, F0, 6A, 02, E8, BD, CA, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, 63, 85, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Code size:
403 KB (412,672 bytes)

Scheduled Task
Task name:
18e2b09b-346a-45bc-b70c-7fd8b6e69215-1

Trigger:
Logon (Runs on logon)

Action:
hd-v1.2-codedownloader.exe \begyztrb \axtmrub=task \iuxmdu='hd-v1.2' \olrhmk=


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to update.srvstatsdata.com  (69.16.175.42:80)

 
http://update.srvstatsdata.com/installer_updates/003772/update.json

TCP (HTTP):
Connects to stats.srvstatsdata.com  (176.32.99.41:80)

TCP (HTTP):
Connects to app-static.crossrider.com  (69.16.175.10:80)

Remove hd-v1.2-codedownloader.exe - Powered by Reason Core Security