phdsetup.exe

Robokid Technologies

By using the Crossrider framework, this web extension is loaded in the web browser and displays advertisments on web pages not affiliated by the extension or company. These unwanted advertisements are injected by the extension in the browser in the form of common ad types such as banners and text-links. The application phdsetup.exe by Robokid Technologies has been detected as adware by 14 anti-malware scanners. The program is a setup application that uses the Nullsoft Install System installer. It is built using the Crossrider cross-browser extension platform. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider. It is distributed as part of the Brightcircle group of browser-extensions.
Publisher:
Robokid Technologies  (signed and verified)

Description:
Sdnpheyj

Version:
0.10.18.23

MD5:
51881e21cb53deb4d41fa3e579a70b04

SHA-1:
3f8995963b309a5ccaff418faf83481bbc76ceef

SHA-256:
bb9125713593fb202237241f078fe79cbba7f3bc951b68492259fb0cdbf163f2

Scanner detections:
14 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements. Distributed through the Brightcircle investments brand.

Analysis date:
5/10/2024 1:37:51 PM UTC  (today)

Scan engine
Detection
Engine version

AegisLab AV Signature
AdWare.NSIS.Indirect
2.1.4+

Agnitum Outpost
Trojan.Crossrider
7.1.1

AhnLab V3 Security
Win-PUP/CrossRider
2014.10.23

Avira AntiVirus
ADWARE/CrossRider.Gen
7.11.180.154

AVG
Generic
2015.0.3313

Dr.Web
infected with Trojan.Crossrider.27788
9.0.1.05190

ESET NOD32
Win32/Packed.ScrambleWrapper.M potentially unwanted application
7.0.302.0

Kaspersky
not-a-virus:WebToolbar.Win32.CroRi
15.0.0.494

Malwarebytes
PUP.Optional.CrossRider
v2014.10.22.05

NANO AntiVirus
Trojan.Win32.Crossrider.ddykip
0.28.2.62841

Reason Heuristics
PUP.Installer.RobokidTechnologies.I
14.10.22.17

Sophos
AppRider
4.98

Trend Micro House Call
Suspici.1E48FE7A
7.2.295

Vba32 AntiVirus
Trojan.GoogUpdate
3.12.26.3

File size:
7.9 MB (8,282,128 bytes)

File type:
Executable application (Win32 EXE)

Installer:
Nullsoft Install System

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\phdsetup.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
6/23/2014 3:00:00 AM

Valid to:
6/24/2015 2:59:59 AM

Subject:
CN=Robokid Technologies, O=Robokid Technologies, STREET=Athinodorou 3 Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00ECF35E880AD0F3BC6F82DFB1F2E84CC0

File PE Metadata
Compilation timestamp:
12/4/2012 3:55:02 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.22

CTPH (ssdeep):
196608:pMKDjRSZAgmeyFROihMrAj36CaiaCsBeSEO:pHBSZA/XErAj36I1sBew

Entry address:
0x4323

Entry point:
55, 89, E5, 57, 56, 53, 81, EC, AC, 01, 00, 00, FF, 15, 74, C3, 44, 00, C7, 04, 24, 01, 80, 00, 00, FF, 15, 58, C4, 44, 00, 53, C7, 04, 24, 00, 00, 00, 00, FF, 15, 98, C4, 44, 00, 56, A3, 40, 3B, 44, 00, C7, 04, 24, 08, 00, 00, 00, E8, 8D, 3B, 00, 00, A3, 9C, 3B, 44, 00, 8D, 85, 84, FE, FF, FF, 57, C7, 44, 24, 10, 00, 00, 00, 00, C7, 44, 24, 0C, 60, 01, 00, 00, 89, 44, 24, 08, C7, 44, 24, 04, 00, 00, 00, 00, C7, 04, 24, 01, B3, 40, 00, FF, 15, AC, C4, 44, 00, 83, EC, 14, C7, 44, 24, 04, 02, B3, 40, 00, C7...
 
[+]

Code size:
34.5 KB (35,328 bytes)

Remove phdsetup.exe - Powered by Reason Core Security