hdshop-codedownloader.exe

hdshop

hdplus

The application hdshop-codedownloader.exe has been detected as adware by 6 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. Built using the Crossrider web brower toolkit the CodeDownloader component will automatically connnect to the remote API server and download additional code/components for hdplus extension/toolbar. The component makes a number of requests to the host app-static.crossrider.com/plugins/.../monetization/monetizationLoader.js.
Publisher:
hdplus

Product:
hdshop

Description:
hdshop exe

Version:
1000.1000.1000.1000

MD5:
e78d8f4c7b509616300da9f0a497ffee

SHA-1:
5fcb7dcd7af7786b754cac7a638462f60b7cb51e

SHA-256:
1eb41d68f6bd4e1c2062b58ae4c03cdc5b0f069350780d4082f1ee284c94576b

Scanner detections:
6 / 68

Status:
Adware

Explanation:
May modify the web browser's settings including changing the homepage and search provider in addition to delivering ads (by injecting banner and text-links directly in the webpage).

Note:
Crossrider is the owner of a platform that enables the creation of cross-browser extensions by developers but is not the owner of this detected application.

Analysis date:
4/27/2024 2:09:53 AM UTC  (today)

Scan engine
Detection
Engine version

Baidu Antivirus
Adware.Win32.CrossRider
4.0.3.14321

ESET NOD32
Win32/Toolbar.CrossRider.AA (variant)
8.9563

Malwarebytes
PUP.Optional.HDShop.A
v2014.03.21.03

McAfee
Artemis!E78D8F4C7B50
5600.7184

Trend Micro House Call
TROJ_GEN.F47V0308
7.2.80

VIPRE Antivirus
Crossrider
27544

File size:
554 KB (567,296 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
hdshop.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\hdshop\hdshop-codedownloader.exe

File PE Metadata
Compilation timestamp:
3/6/2014 10:57:55 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
12288:okZkLCWw8pVrwBjSx+OeBUqkGnQ+utYrLAfapTcsVe:oWsCWw8pVrwBjSx6B1kmY2Tm

Entry address:
0x4DC0F

Entry point:
E8, CD, D4, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 30, 66, 48, 00, E8, FB, 49, 00, 00, E8, 6F, 1D, 00, 00, 0F, B7, F0, 6A, 02, E8, 60, D4, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, 8D, 7A, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Entropy:
6.4346

Code size:
435.5 KB (445,952 bytes)

Scheduled Task
Task name:
hdshop-codedownloader

Trigger:
Logon (Runs on logon)

Action:
hdshop-codedownloader.exe \reinstallapp \runfrom=task \agentregpath='hdshop'


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to update.srvstatsdata.com  (69.16.175.42:80)

 
http://update.srvstatsdata.com/installer_updates/008979/update.json

TCP (HTTP):
Connects to stats.srvstatsdata.com  (176.32.99.41:80)

TCP (HTTP):
Connects to app-static.crossrider.com  (69.16.175.10:80)

Remove hdshop-codedownloader.exe - Powered by Reason Core Security