video mediaplay-air-codedownloader.exe

video MediaPlay-Air

Robokid Technologies

By using the Crossrider framework, this web extension is loaded in the web browser and displays advertisments on web pages not affiliated by the extension or company. These unwanted advertisements are injected by the extension in the browser in the form of common ad types such as banners and text-links. The application video mediaplay-air-codedownloader.exe, “video MediaPlay-Air exe” by Robokid Technologies has been detected as adware by 40 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. This file is typically installed with the program video MediaPlay-Air by Robokid Technologies which is a potentially unwanted software program. Built using the Crossrider web brower toolkit the CodeDownloader component will automatically connnect to the remote API server and download additional code/components for enter extension/toolbar. The component makes a number of requests to the host app-static.crossrider.com/plugins/.../monetization/monetizationLoader.js. It is distributed as part of the Brightcircle group of browser-extensions.
Publisher:
enter  (signed by Robokid Technologies)

Product:
video MediaPlay-Air

Description:
video MediaPlay-Air exe

Version:
1000.1000.1000.1000

MD5:
13bbe60d96bc7dc242b440e5a0302aa8

SHA-1:
7593d7fc077aba12b37ad72725fe7dc3b6562cdf

SHA-256:
6b0a9e6ec0e3acf4fa382dbe03e67268b179f53485e98a14f45f30bf47d8ffa3

Scanner detections:
40 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements. Distributed through the Brightcircle investments brand.

Note:
Crossrider is the owner of a platform that enables the creation of cross-browser extensions by developers but is not the owner of this detected application. The owner/publisher of this file is Robokid Technologies.

Analysis date:
4/19/2024 10:55:59 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Kazy.374109
926

Agnitum Outpost
Win32.Sality.BL
7.1.1

AhnLab V3 Security
PUP/Win32.PlusHD
2014.06.18

Avira AntiVirus
Adware/CrossRider.AC
7.11.147.150

avast!
Win32:PUP-gen [PUP]
2014.9-140723

AVG
Generic
2015.0.3404

Baidu Antivirus
Adware.Win32.CrossRider
4.0.3.14723

Bitdefender
Gen:Variant.Kazy.374109
1.0.20.1020

Bkav FE
W32.CrossRiderL.Adware
1.3.0.4959

Comodo Security
ApplicUnwnt
18241

Dr.Web
Trojan.Crossrider.950
9.0.1.0204

Emsisoft Anti-Malware
Gen:Variant.Kazy.374109
8.14.07.23.03

ESET NOD32
Win32/Toolbar.CrossRider.AJ potentially unwanted application
7.0.302.0

Fortinet FortiGate
Riskware/Toolbar_CrossRider
7/23/2014

F-Prot
W32/A-eb9ef301
v6.4.7.1.166

F-Secure
Gen:Variant.Kazy.374109
11.2014-23-07_4

G Data
Gen:Variant.Kazy.374109
14.7.24

IKARUS anti.virus
PUA.OptionalInst.Goobzo
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.180.12498

Kaspersky
Virus.Win32.Sality
14.0.0.3517

Malwarebytes
PUP.Optional.MediaPlayer.A
v2014.07.23.03

McAfee
Artemis!32D0D5490B6D
5600.7060

Microsoft Security Essentials
Threat.Undefined
1.177.1852.0

MicroWorld eScan
Gen:Variant.Kazy.374109
15.0.0.612

NANO AntiVirus
Riskware.Win32.AdLoad.dbdvli
0.28.0.60253

Norman
Sality.ZHB
11.20140723

nProtect
Virus/W32.Sality.D
14.07.07.01

Panda Antivirus
Trj/Genetic.gen
14.07.23.03

Qihoo 360 Security
Win32/Trojan.Adware.37e
1.0.0.1015

Quick Heal
W32.Sality.U
7.14.14.00

Reason Heuristics
PUP.Crossrider.Task.c
14.7.23.15

Rising Antivirus
PE:Malware.Obscure!1.9C59
23.00.65.14721

Sophos
AppRider
4.98

Total Defense
Win32/Sality.AA
37.0.11044

Trend Micro House Call
TROJ_GEN.F47V1224
7.2.204

Trend Micro
PE_SALITY.RL
10.465.23

Vba32 AntiVirus
Virus.Win32.Sality.bakc
3.12.26.3

VIPRE Antivirus
Crossrider
31162

ViRobot
Win32.Sality.N
2011.4.7.4223

Zillya! Antivirus
Virus.Sality.Win32.20
2.0.0.1849

File size:
543.5 KB (556,568 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
video MediaPlay-Air.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\video mediaplay-air\video mediaplay-air-codedownloader.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
6/23/2014 1:00:00 AM

Valid to:
6/24/2015 12:59:59 AM

Subject:
CN=Robokid Technologies, O=Robokid Technologies, STREET=Athinodorou 3 Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00ECF35E880AD0F3BC6F82DFB1F2E84CC0

File PE Metadata
Compilation timestamp:
7/22/2014 11:04:04 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
6144:ykaiwLATVmMOaSxnpoNjtkTdoIB5jrNnaMTDNKZuqWe1V2InXpTBjjUFHZ:y1L6waShpo1tkaMlfTDI4g1IIXpT1jw

Entry address:
0x48183

Entry point:
E8, B0, DD, 00, 00, E9, 7F, FE, FF, FF, CC, CC, CC, 57, 56, 53, 33, FF, 8B, 44, 24, 14, 0B, C0, 7D, 14, 47, 8B, 54, 24, 10, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 14, 89, 54, 24, 10, 8B, 44, 24, 1C, 0B, C0, 7D, 14, 47, 8B, 54, 24, 18, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 1C, 89, 54, 24, 18, 0B, C0, 75, 18, 8B, 4C, 24, 18, 8B, 44, 24, 14, 33, D2, F7, F1, 8B, D8, 8B, 44, 24, 10, F7, F1, 8B, D3, EB, 41, 8B, D8, 8B, 4C, 24, 18, 8B, 54, 24, 14, 8B, 44, 24, 10, D1, EB, D1, D9, D1, EA, D1, D8, 0B, DB, 75, F4...
 
[+]

Entropy:
6.4227

Code size:
429 KB (439,296 bytes)

Scheduled Task
Task name:
9a2748f4-9e4a-4fa8-9c8f-cbbe03388518-1

Trigger:
Logon (Runs on logon)

Action:
video mediaplay-air-codedownloader.exe \fwscc \elmyu=task \fxyintq='video mediaplay-air'


The file video mediaplay-air-codedownloader.exe has been discovered within the following program.

video MediaPlay-Air  by Robokid Technologies
video MediaPlay-Air (Freeven) is an advertising supported (adware) extension that runs in the context of the user's web browser as well as a process in the background.
crossrider.com/install/59599-video-mediaplayer
83% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to update.srvstatsdata.com  (69.16.175.42:80)

 
http://update.srvstatsdata.com/installer_updates/001069/update.json

TCP (HTTP):
Connects to stats.srvstatsdata.com  (176.32.99.41:80)

TCP (HTTP):
Connects to app-static.crossrider.com  (69.16.175.10:80)

Remove video mediaplay-air-codedownloader.exe - Powered by Reason Core Security