v-9.1hd-codedownloader.exe

Robokid Technologies

By using the Crossrider framework, this web extension is loaded in the web browser and displays advertisments on web pages not affiliated by the extension or company. These unwanted advertisements are injected by the extension in the browser in the form of common ad types such as banners and text-links. The application v-9.1hd-codedownloader.exe by Robokid Technologies has been detected as adware by 37 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. This file is typically installed with the program V-9.1HD by Evangelion Group which is a potentially unwanted software program. Built using the Crossrider web brower toolkit the CodeDownloader component will automatically connnect to the remote API server and download additional code/components for V-9.1HD extension/toolbar. The component makes a number of requests to the host app-static.crossrider.com/plugins/.../monetization/monetizationLoader.js. It is part of the Brightcircle group of web-extensions that inject advertisements in the browser.
Publisher:
V-9.1HD  (signed by Robokid Technologies)

Product:
V-9.1HD

Description:
V-9.1HD exe

Version:
1000.1000.1000.1000

MD5:
ebbcfcc5ccfb11aec93a099f290dce60

SHA-1:
0616001c2cf7618fed6188304ce670d21068f4cb

SHA-256:
d689beedc1d041a206a6f7872d808fd66cb6a0e4224ceef0871b9b259bd5e056

Scanner detections:
37 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Note:
Crossrider is the owner of a platform that enables the creation of cross-browser extensions by developers but is not the owner of this detected application. The owner/publisher of this file is Robokid Technologies.

Analysis date:
4/26/2024 11:36:18 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Kazy.374109
835

AegisLab AV Signature
Troj.Banker.W32.Lohmys
2.1.4+

AhnLab V3 Security
Win32/Kashu.E
2014.07.08

Avira AntiVirus
Adware/CrossRider.A.14083
7.11.157.204

avast!
Win32:Crossrider-AH [PUP]
141003-0

AVG
Generic
2015.0.3313

Baidu Antivirus
Adware.Win32.CrossRider
4.0.3.141022

Bitdefender
Gen:Variant.Adware.Kazy.374109
1.0.20.1475

Bkav FE
W32.CrossRiderL.Adware
1.3.0.4959

Clam AntiVirus
Win.Adware.Agent-7677
0.98/19185

Comodo Security
ApplicUnwnt
18241

Dr.Web
Trojan.Crossrider.28676
9.0.1.05190

Emsisoft Anti-Malware
Gen:Variant.Adware.Kazy.374109
8.14.10.22.05

ESET NOD32
Win32/Toolbar.CrossRider.AK potentially unwanted application
7.0.302.0

Fortinet FortiGate
Riskware/Toolbar_CrossRider
10/22/2014

F-Prot
W32/A-eb9ef301
v6.4.7.1.166

F-Secure
Gen:Variant.Adware.Kazy.374109
11.2014-22-10_4

G Data
Gen:Variant.Adware.Kazy.374109
14.10.24

IKARUS anti.virus
AdWare.CrossRider
t3scan.1.6.1.0

K7 AntiVirus
Virus
13.180.12643

Kaspersky
not-a-virus:WebToolbar.Win32.CroRi
15.0.0.494

Malwarebytes
PUP.Optional.HDPlus.A
v2014.10.22.05

McAfee
Trojan.Artemis!A0736EA2C153
5600.6969

Microsoft Security Essentials
Threat.Undefined
1.177.1852.0

MicroWorld eScan
Gen:Variant.Adware.Kazy.374109
15.0.0.885

NANO AntiVirus
Riskware.Win32.AdLoad.dbsshb
0.28.0.60577

Norman
Sality.ZHB
11.20141022

Panda Antivirus
PUP/PlusHD
14.10.22.05

Qihoo 360 Security
Malware.QVM19.Gen
1.0.0.1015

Reason Heuristics
PUP.Crossrider.Task.V
14.10.22.17

Rising Antivirus
PE:Malware.Obscure!1.9C59
23.00.65.141020

Sophos
AppRider
4.98

SUPERAntiSpyware
Trojan.Agent/Gen-Nullo[Short]
10284

Trend Micro House Call
PE_SALITY.RL
7.2.295

Trend Micro
PE_SALITY.RL
10.465.22

VIPRE Antivirus
Threat.4789396
29708

Zillya! Antivirus
Adware.AdLoad.Win32.114
2.0.0.1847

File size:
546 KB (559,128 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
V-9.1HD.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\v-9.1hd\v-9.1hd-codedownloader.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
6/23/2014 1:00:00 AM

Valid to:
6/24/2015 12:59:59 AM

Subject:
CN=Robokid Technologies, O=Robokid Technologies, STREET=Athinodorou 3 Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00ECF35E880AD0F3BC6F82DFB1F2E84CC0

File PE Metadata
Compilation timestamp:
7/19/2014 11:04:06 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
6144:whZSQM1clb1NMe0LMJ31P8Jmkk/Yy3qxDZHMuqPuMJH8pTBkrNsRExMu:whsBclbYeoat3qxDZHVSVJH8pTG51

Entry address:
0x47BE3

Entry point:
E8, B8, DD, 00, 00, E9, 7F, FE, FF, FF, CC, CC, CC, 57, 56, 53, 33, FF, 8B, 44, 24, 14, 0B, C0, 7D, 14, 47, 8B, 54, 24, 10, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 14, 89, 54, 24, 10, 8B, 44, 24, 1C, 0B, C0, 7D, 14, 47, 8B, 54, 24, 18, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 1C, 89, 54, 24, 18, 0B, C0, 75, 18, 8B, 4C, 24, 18, 8B, 44, 24, 14, 33, D2, F7, F1, 8B, D8, 8B, 44, 24, 10, F7, F1, 8B, D3, EB, 41, 8B, D8, 8B, 4C, 24, 18, 8B, 54, 24, 14, 8B, 44, 24, 10, D1, EB, D1, D9, D1, EA, D1, D8, 0B, DB, 75, F4...
 
[+]

Entropy:
6.4186

Code size:
431.5 KB (441,856 bytes)

Scheduled Task
Task name:
93dee4e5-3afd-4154-8946-08f2b5c75d55-1

Trigger:
Logon (Runs on logon)


The file v-9.1hd-codedownloader.exe has been discovered within the following program.

V-9.1HD  by Evangelion Group
Plus-HD-9.1c (Freeven) is an adware program that runs within the user's web browser and will modify various browser settings such as changing the search provider.
crossrider.com/install/61776-plus-hd-9-1c
86% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to update.srvstatsdata.com  (69.16.175.42:80)

 
http://update.srvstatsdata.com/installer_updates/002329/update.json

TCP (HTTP):
Connects to stats.srvstatsdata.com  (176.32.99.41:80)

TCP (HTTP):
Connects to app-static.crossrider.com  (69.16.175.10:80)

Remove v-9.1hd-codedownloader.exe - Powered by Reason Core Security