{blocked}.exe

SavePass

Sailor Project

This potentially unwanted Internet browser extension is built upon and distributed using the free Crossrider platform and will deliver advertisements to the web browser in various formats such as banner, text hyper-links, inline text and transitional ads. The application {blocked}.exe by Sailor Project has been detected as adware by 15 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. Built using the Crossrider web brower toolkit the CodeDownloader component will automatically connnect to the remote API server and download additional code/components for OutBrowse extension/toolbar. The component makes a number of requests to the host app-static.crossrider.com/plugins/.../monetization/monetizationLoader.js. It is part of the Brightcircle group of web-extensions that inject advertisements in the browser.
Publisher:
OutBrowse  (signed by Sailor Project)

Product:
SavePass

Description:
SavePass exe

Version:
1000.1000.1000.1000

MD5:
729ebca31e85524dd0b395d8fb9ef02d

SHA-1:
964ba973bc40d5876bec3e13c215521830da25e6

SHA-256:
4f333c8d9db5b6f11aa3d879130a08cc73c3b78217fe0e3f764c4ef30bcc52a4

Scanner detections:
15 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Note:
Crossrider is the owner of a platform that enables the creation of cross-browser extensions by developers but is not the owner of this detected application. The owner/publisher of this file is Sailor Project.

Analysis date:
4/26/2024 3:27:32 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Kazy.374109
922

Avira AntiVirus
ADWARE/CrossRider.Gen2
7.11.164.52

Bitdefender
Gen:Variant.Adware.Kazy.374109
1.0.20.1045

Emsisoft Anti-Malware
Gen:Variant.Adware.Kazy.374109
8.14.07.28.12

ESET NOD32
Win32/Toolbar.CrossRider.AK (variant)
8.10160

F-Secure
Gen:Variant.Adware.Kazy.374109
11.2014-28-07_2

G Data
Gen:Variant.Adware.Kazy.374109
14.7.24

IKARUS anti.virus
not-a-virus:WebToolbar.CrossRider
t3scan.1.6.1.0

Malwarebytes
PUP.Optional.SavePass.A
v2014.07.28.12

McAfee
Artemis!729EBCA31E85
5600.7056

MicroWorld eScan
Gen:Variant.Adware.Kazy.374109
15.0.0.627

Panda Antivirus
Trj/Genetic.gen
14.07.28.12

Reason Heuristics
PUP.Crossrider.SailorProject.X
14.7.28.0

Sophos
Generic PUA JG
4.98

VIPRE Antivirus
Crossrider
31656

File size:
500.4 KB (512,360 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
SavePass.exe

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\savepass\savepass-codedownloader.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
7/18/2014 8:00:00 AM

Valid to:
7/19/2015 7:59:59 AM

Subject:
CN=Sailor Project, O=Sailor Project, STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
47C5F145C734CD3D086C0A102176F0A1

File PE Metadata
Compilation timestamp:
7/26/2014 6:03:52 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
12288:IRFX9pBY1yyGIBLPOa9+pa0y7ZM4KHuSlRILMljApT9aND:IRFX9pBY1yyGIBLPOa9+pFydKOwPjMT4

Entry address:
0x42513

Entry point:
E8, B0, DD, 00, 00, E9, 7F, FE, FF, FF, CC, CC, CC, 57, 56, 53, 33, FF, 8B, 44, 24, 14, 0B, C0, 7D, 14, 47, 8B, 54, 24, 10, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 14, 89, 54, 24, 10, 8B, 44, 24, 1C, 0B, C0, 7D, 14, 47, 8B, 54, 24, 18, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 1C, 89, 54, 24, 18, 0B, C0, 75, 18, 8B, 4C, 24, 18, 8B, 44, 24, 14, 33, D2, F7, F1, 8B, D8, 8B, 44, 24, 10, F7, F1, 8B, D3, EB, 41, 8B, D8, 8B, 4C, 24, 18, 8B, 54, 24, 14, 8B, 44, 24, 10, D1, EB, D1, D9, D1, EA, D1, D8, 0B, DB, 75, F4...
 
[+]

Entropy:
6.4111

Code size:
386.5 KB (395,776 bytes)

Scheduled Task
Task name:
a290dc11-afd6-476f-8e9d-82104f941a92-1

Trigger:
Logon (Runs on logon)

Action:
savepass-codedownloader.exe \hoyqpi \maggqanl=task \uaawymn='savepass' \lesdy=


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to update.srvstatsdata.com  (69.16.175.42:80)

 
http://update.srvstatsdata.com/installer_updates/002674/update.json

TCP (HTTP):
Connects to stats.srvstatsdata.com  (176.32.99.41:80)

TCP (HTTP):
Connects to app-static.crossrider.com  (69.16.175.10:80)

Remove {blocked}.exe - Powered by Reason Core Security