videos mediaplay-air-codedownloader.exe

videos MediaPlay-Air

Sailor Project

This potentially unwanted Internet browser extension is built upon and distributed using the free Crossrider platform and will deliver advertisements to the web browser in various formats such as banner, text hyper-links, inline text and transitional ads. The application videos mediaplay-air-codedownloader.exe, “videos MediaPlay-Air exe” by Sailor Project has been detected as adware by 15 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. Built using the Crossrider web brower toolkit the CodeDownloader component will automatically connnect to the remote API server and download additional code/components for enter extension/toolbar. The component makes a number of requests to the host app-static.crossrider.com/plugins/.../monetization/monetizationLoader.js. It is distributed as part of the Brightcircle group of browser-extensions.
Publisher:
enter  (signed by Sailor Project)

Product:
videos MediaPlay-Air

Description:
videos MediaPlay-Air exe

Version:
1000.1000.1000.1000

MD5:
030b044275970eb9cdd215a703a9cdcc

SHA-1:
397e176b871b529e0ce85f69228e7f4e1ab50843

SHA-256:
323a8382aa262d213cddea19753ad735a9df9ef44c10cb88ddccbef5e454b789

Scanner detections:
15 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements. Distributed through the Brightcircle investments brand.

Note:
Crossrider is the owner of a platform that enables the creation of cross-browser extensions by developers but is not the owner of this detected application. The owner/publisher of this file is Sailor Project.

Analysis date:
4/25/2024 7:53:13 AM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
ADWARE/CrossRider.Gen2
7.11.165.16

avast!
Win32:Malware-gen
2014.9-140810

AVG
Generic
2015.0.3386

Baidu Antivirus
PUA.Win32.CrossRider
4.0.3.14810

Dr.Web
Trojan.Crossrider.27784
9.0.1.0222

ESET NOD32
Win32/Toolbar.CrossRider.AJ potentially unwanted application
8.7.0.302.0

IKARUS anti.virus
not-a-virus:WebToolbar.CrossRider
t3scan.1.6.1.0

Kaspersky
not-a-virus:WebToolbar.Win32.CrossRider
14.0.0.3427

Malwarebytes
PUP.Optional.BrowsersApp.A
v2014.08.10.12

McAfee
Trojan.Artemis!DAA65DC96498
5600.6978

Panda Antivirus
Trj/Genetic.gen
14.08.10.12

Qihoo 360 Security
Malware.QVM10.Gen
1.0.0.1015

Reason Heuristics
PUP.Crossrider.SailorProject.d
14.8.10.12

VIPRE Antivirus
Threat.4789396
31208

File size:
563.4 KB (576,872 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
videos MediaPlay-Air.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\videos mediaplay-air\videos mediaplay-air-codedownloader.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
7/17/2014 8:00:00 PM

Valid to:
7/18/2015 7:59:59 PM

Subject:
CN=Sailor Project, O=Sailor Project, STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
47C5F145C734CD3D086C0A102176F0A1

File PE Metadata
Compilation timestamp:
8/9/2014 6:07:47 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
12288:7eMLsewPcWJK4ykyCH3I5hu7UzGupT/xc:7eDPcM/dHbWGiTpc

Entry address:
0x48AAA

Entry point:
E8, 79, DE, 00, 00, E9, 7F, FE, FF, FF, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 57, 56, 53, 33, FF, 8B, 44, 24, 14, 0B, C0, 7D, 14, 47, 8B, 54, 24, 10, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 14, 89, 54, 24, 10, 8B, 44, 24, 1C, 0B, C0, 7D, 14, 47, 8B, 54, 24, 18, F7, D8, F7, DA, 83, D8, 00, 89, 44, 24, 1C, 89, 54, 24, 18, 0B, C0, 75, 18, 8B, 4C, 24, 18, 8B, 44, 24, 14, 33, D2, F7, F1, 8B, D8, 8B, 44, 24, 10, F7, F1, 8B, D3, EB, 41, 8B, D8, 8B, 4C, 24, 18, 8B, 54, 24, 14, 8B, 44, 24, 10, D1, EB, D1...
 
[+]

Entropy:
6.4336

Code size:
445 KB (455,680 bytes)

Scheduled Task
Task name:
706467f0-c73a-4265-9740-834f67bfec79-1

Trigger:
Logon (Runs on logon)

Action:
videos mediaplay-air-codedownloader.exe \bukys \wowislbg=task \mqobbdfq='videos mediaplay-


The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to ip-50-63-202-46.ip.secureserver.net  (50.63.202.46:80)

Remove videos mediaplay-air-codedownloader.exe - Powered by Reason Core Security