hd-v1.9-codedownloader.exe

HD-V1.9

Evangelion Group

This potentially unwanted Internet browser extension is built upon and distributed using the free Crossrider platform and will deliver advertisements to the web browser in various formats such as banner, text hyper-links, inline text and transitional ads. The application hd-v1.9-codedownloader.exe by Evangelion Group has been detected as adware by 15 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. Built using the Crossrider web brower toolkit the CodeDownloader component will automatically connnect to the remote API server and download additional code/components for InfoHD-V1.8 extension/toolbar. The component makes a number of requests to the host app-static.crossrider.com/plugins/.../monetization/monetizationLoader.js. It is distributed as part of the Brightcircle group of browser-extensions.
Publisher:
InfoHD-V1.8  (signed by Evangelion Group)

Product:
HD-V1.9

Description:
HD-V1.9 exe

Version:
1000.1000.1000.1000

MD5:
41fad8d3015e75ef88f144e3cdfac223

SHA-1:
b6254b1363e0f078a9de7c0d4dc688efa0f615f0

SHA-256:
3467d7c04b9fcf4f07176fe6130fb008dcb703883131a204daada2132c910529

Scanner detections:
15 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements. Distributed through the Brightcircle investments brand.

Note:
Crossrider is the owner of a platform that enables the creation of cross-browser extensions by developers but is not the owner of this detected application. The owner/publisher of this file is Evangelion Group.

Analysis date:
4/26/2024 7:07:37 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Kazy.374109
913

Avira AntiVirus
ADWARE/CrossRider.Gen2
7.11.164.206

avast!
Win32:Adware-gen [Adw]
2014.9-140805

AVG
Generic
2015.0.3391

Bitdefender
Gen:Variant.Adware.Kazy.374109
1.0.20.1085

Emsisoft Anti-Malware
Gen:Variant.Adware.Kazy.374109
8.14.08.05.10

ESET NOD32
Win32/Toolbar.CrossRider.AK potentially unwanted application
7.0.302.0

F-Secure
Gen:Variant.Adware.Kazy.374109
11.2014-05-08_3

G Data
Gen:Variant.Adware.Kazy.374109
14.8.24

IKARUS anti.virus
not-a-virus:WebToolbar.CrossRider
t3scan.1.6.1.0

Malwarebytes
PUP.Optional.InfoHD.A
v2014.07.31.03

MicroWorld eScan
Gen:Variant.Adware.Kazy.374109
15.0.0.651

Panda Antivirus
Trj/Genetic.gen
14.07.31.03

Reason Heuristics
PUP.Crossrider.Task.V
14.8.5.22

VIPRE Antivirus
Threat.4789396
31208

File size:
543.4 KB (556,400 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
HD-V1.9.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\hd-v1.9\hd-v1.9-codedownloader.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
7/28/2014 1:00:00 AM

Valid to:
7/29/2015 12:59:59 AM

Subject:
CN=Evangelion Group, O=Evangelion Group, STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
0095E2A1168FF10F1D56CF5FFE4ABC7450

File PE Metadata
Compilation timestamp:
7/31/2014 12:42:11 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
6144:DcqCosoEaeYBgv+0BW7jX0zqA287bxWeg0JiJtpTBn9amfVclG:DHs1aX0da87bxWx0JiJtpTJ9amMG

Entry address:
0x46BFA

Entry point:
E8, 6B, DE, 00, 00, E9, 7F, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 57, 56, 53, 33, FF, 8B, 44, 24, 14, 0B, C0, 7D, 14, 47, 8B, 54, 24, 10, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 14, 89, 54, 24, 10, 8B, 44, 24, 1C, 0B, C0, 7D, 14, 47, 8B, 54, 24, 18, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 1C, 89, 54, 24, 18, 0B, C0, 75, 18, 8B, 4C, 24, 18, 8B, 44, 24, 14, 33, D2, F7, F1, 8B, D8, 8B, 44, 24, 10, F7, F1, 8B, D3, EB, 41, 8B, D8, 8B, 4C, 24, 18, 8B, 54, 24, 14, 8B, 44, 24, 10, D1, EB, D1...
 
[+]

Code size:
426 KB (436,224 bytes)

Scheduled Task
Task name:
56251b03-57a4-4f99-9f1c-c5a0f988a08a-1

Trigger:
Logon (Runs on logon)

Action:
hd-v1.9-codedownloader.exe \ptojw \pmgsyhan=task \xedze='hd-v1.9' \blviok=617


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to update.srvstatsdata.com  (69.16.175.42:80)

 
http://update.srvstatsdata.com/installer_updates/003951/update.json

TCP (HTTP):
Connects to stats.srvstatsdata.com  (176.32.99.41:80)

TCP (HTTP):
Connects to app-static.crossrider.com  (69.16.175.10:80)

Remove hd-v1.9-codedownloader.exe - Powered by Reason Core Security