v-9.1hd-codedownloader.exe

Robokid Technologies

By using the Crossrider framework, this web extension is loaded in the web browser and displays advertisments on web pages not affiliated by the extension or company. These unwanted advertisements are injected by the extension in the browser in the form of common ad types such as banners and text-links. The application v-9.1hd-codedownloader.exe by Robokid Technologies has been detected as adware by 40 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. Built using the Crossrider web brower toolkit the CodeDownloader component will automatically connnect to the remote API server and download additional code/components for V-9.1HD extension/toolbar. The component makes a number of requests to the host app-static.crossrider.com/plugins/.../monetization/monetizationLoader.js. It is distributed as part of the Brightcircle group of browser-extensions.
Publisher:
V-9.1HD  (signed by Robokid Technologies)

Product:
V-9.1HD

Description:
V-9.1HD exe

Version:
1000.1000.1000.1000

MD5:
27e73b9ce134008859c5bb1a3e366468

SHA-1:
052b59d0a51b840361507f9bd2fdee02313b60e0

SHA-256:
1caa7263063f3214b8244ee47f04c87898029d8f732dbc1d5661bdc164957a57

Scanner detections:
40 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements. Distributed through the Brightcircle investments brand.

Note:
Crossrider is the owner of a platform that enables the creation of cross-browser extensions by developers but is not the owner of this detected application. The owner/publisher of this file is Robokid Technologies.

Analysis date:
4/20/2024 1:00:05 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Win32.Sality.3
925

Agnitum Outpost
Win32.Sality.BL
7.1.1

AhnLab V3 Security
Win32/Kashu.E
2014.07.08

Avira AntiVirus
Adware/CrossRider.A.14083
7.11.157.204

avast!
Win32:SaliCode
2014.9-140725

AVG
Generic
2015.0.3403

Baidu Antivirus
Adware.Win32.CrossRider
4.0.3.14725

Bitdefender
Win32.Sality.3
1.0.20.1030

Bkav FE
W32.Sality.PE
1.3.0.4959

Comodo Security
Virus.Win32.Sality.Gen
18799

Dr.Web
Trojan.Crossrider.25819
9.0.1.0206

Emsisoft Anti-Malware
Win32.Sality
8.14.07.25.11

ESET NOD32
Win32/Toolbar.CrossRider.AJ potentially unwanted application
7.0.302.0

Fortinet FortiGate
Riskware/Toolbar_CrossRider
7/25/2014

F-Prot
W32/Sality.gen2
v6.4.6.5.141

F-Secure
Win32.Sality.3
11.2014-25-07_6

G Data
Win32.Sality
14.7.24

IKARUS anti.virus
Virus.Win32.Sality
t3scan.1.6.1.0

K7 AntiVirus
Virus
13.180.12643

Kaspersky
Virus.Win32.Sality
14.0.0.3508

Malwarebytes
PUP.Optional.HDPlus.A
v2014.07.25.11

McAfee
W32/Sality.gen.z
5600.7059

Microsoft Security Essentials
Threat.Undefined
1.177.1852.0

MicroWorld eScan
Win32.Sality.3
15.0.0.618

NANO AntiVirus
Riskware.Win32.AdLoad.dbsshb
0.28.0.60577

Norman
Sality.ZHB
11.20140725

nProtect
Virus/W32.Sality.D
14.07.07.01

Panda Antivirus
W32/Sality.AA
14.07.25.11

Qihoo 360 Security
Malware.QVM19.Gen
1.0.0.1015

Quick Heal
W32.Sality.U
7.14.14.00

Reason Heuristics
PUP.Crossrider.RobokidTechnologies.V
14.7.25.11

Rising Antivirus
PE:Malware.Obscure!1.9C59
23.00.65.14723

Sophos
AppRider
4.98

Total Defense
Win32/Sality.AA
37.0.11044

Trend Micro House Call
PE_SALITY.RL
7.2.206

Trend Micro
PE_SALITY.RL
10.465.25

Vba32 AntiVirus
Virus.Win32.Sality.bakc
3.12.26.3

VIPRE Antivirus
Threat.4789396
29708

ViRobot
Win32.Sality.N
2011.4.7.4223

Zillya! Antivirus
Virus.Sality.Win32.20
2.0.0.1849

File size:
543.5 KB (556,568 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
V-9.1HD.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\v-9.1hd\v-9.1hd-codedownloader.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
6/23/2014 1:00:00 AM

Valid to:
6/24/2015 12:59:59 AM

Subject:
CN=Robokid Technologies, O=Robokid Technologies, STREET=Athinodorou 3 Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00ECF35E880AD0F3BC6F82DFB1F2E84CC0

File PE Metadata
Compilation timestamp:
7/22/2014 11:04:04 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
6144:5kaiwLATVmMOaSxnpoNjtkTdoIB5jrNnaMTDNKZuqWe1V2InXpTBjjUFSP:51L6waShpo1tkaMlfTDI4g1IIXpT1jP

Entry address:
0x48183

Entry point:
E8, B0, DD, 00, 00, E9, 7F, FE, FF, FF, CC, CC, CC, 57, 56, 53, 33, FF, 8B, 44, 24, 14, 0B, C0, 7D, 14, 47, 8B, 54, 24, 10, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 14, 89, 54, 24, 10, 8B, 44, 24, 1C, 0B, C0, 7D, 14, 47, 8B, 54, 24, 18, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 1C, 89, 54, 24, 18, 0B, C0, 75, 18, 8B, 4C, 24, 18, 8B, 44, 24, 14, 33, D2, F7, F1, 8B, D8, 8B, 44, 24, 10, F7, F1, 8B, D3, EB, 41, 8B, D8, 8B, 4C, 24, 18, 8B, 54, 24, 14, 8B, 44, 24, 10, D1, EB, D1, D9, D1, EA, D1, D8, 0B, DB, 75, F4...
 
[+]

Code size:
429 KB (439,296 bytes)

Scheduled Task
Task name:
a40053f3-47cb-4347-9c95-ff686ad716a8-1

Trigger:
Logon (Runs on logon)

Action:
v-9.1hd-codedownloader.exe \fwscc \elmyu=task \fxyintq='v-9.1hd' \fhawjde=529


The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to update.srvstatsdata.com  (69.16.175.42:80)

 
http://update.srvstatsdata.com/installer_updates/001772/update.json

TCP (HTTP):
Connects to stats.srvstatsdata.com  (176.32.99.41:80)

TCP (HTTP):
Connects to app-static.crossrider.com  (69.16.175.10:80)

Remove v-9.1hd-codedownloader.exe - Powered by Reason Core Security