Should I remove videosMediaPlayers+?
What percent of users and experts removed it?
82% remove it18% keep it
What do people think about it?
(click star to rate)
How common is it?
Reach <0.001%
Versions
Version | Distribution |
1.35.9.16 |
100.00% |
|
Other programs by Pani Poni Network
videosMediaPlayers+
from Pani Poni Network
What is videosMediaPlayers+?
videosmediaplayers+ is a potentially unwanted adware program that injects ads into the user's browser. This includes inserting into web pages or displaying ads over parts of existing web page advertisements, banners, coupons or text links that would not otherwise appear. It will communicate with the adware's servers to check for new offers and the placement of offers as well as monitoring and recording the domain name of each page the user views, the advertisements that appear on these pages and the ads the user clicks on.
In addition the app may display alerts and popups for updating or installing new applications many of which are ad-supported browser extensions.
Overview
During setup, the program registers itself to launch on boot through a Windows Schedule Task in order to automatically start-up (this is typically done to avoid any UAC prompts). It adds a Browser Helper Object (BHO) to Internet Explorer. Once installed, it will add an extension to both the Firefox and Chrome web browsers. The main program executable is utils.exe. Typically most users end up uninstalling this just after a few days. The software installer includes 25 files and is usually about 18.98 MB (19,905,317 bytes).
- Possible malware installed by this program
- Automatically starts with Windows
- Runs in the Firefox, Chrome and Firefox web browsers
- Known to include offers within the setup
- Injects advertisements unassociated with the underlying web page
- The experts agree, you should remove it!
Warning, multiple anti-virus scanners have detected possible malware in videosMediaPlayers+.
videosMediaPlayers+-bho.dll (5bb311f5edf0b24ec4111926cea4e38f) has been flagged by the following 19 scanners: |
Anti-Virus software | Version | Detection |
Lavasoft Ad-Aware |
806 |
Gen:Application.Heur.Ly9@kSb4X2ei |
AhnLab-V3 |
2014.11.18 |
PUP/Win32.CrossRider |
Avira |
7.11.186.214 |
ADWARE/CrossRider.Gen |
AVware |
1.5.0.21 |
Crossrider (fs) |
Baidu-International |
4.0.3.141121 |
PUA.Win32.CrossRider.bAF |
Bitdefender |
1.0.20.1625 |
Gen:Application.Heur.Ly9@kSb4X2ei |
ESET-NOD32 |
8.10738 |
a variant of Win32/Toolbar.CrossRider.AF |
F-Prot |
v6.4.7.1.166 |
W32/A-ee826839 |
G Data |
14.11.24 |
Gen:Application.Heur.Ly9@kSb4X2ei |
IKARUS anti.virus |
t3scan.1.8.3.0 |
not-a-virus:WebToolbar.CroRi |
K7 AntiVirus |
13.185.14042 |
Unwanted-Program |
K7GW |
13.185.14042 |
Unwanted-Program ( 004a8e8b1 ) |
Kaspersky |
14.0.0.2913 |
Trojan.Win32.GoogUpdate |
Malwarebytes |
v2014.11.21.07 |
PUP.Optional.VideosMediaPlayer.A |
MicroWorld-eScan |
15.0.0.975 |
Gen:Application.Heur.Ly9@kSb4X2ei |
Panda Antivirus |
14.11.21.07 |
Trj/Genetic.gen |
Symantec |
11/21/2014 rev. 6 |
WS.Reputation |
Vba32 AntiVirus |
3.12.26.3 |
Trojan.GoogUpdate |
VIPRE Antivirus |
34876 |
Crossrider (fs) |
fdbdaafb-feea-4d35-aa3e-d287b9a8bfee.exe (929635a06274922420f8bd1b704b1ecb) has been flagged by the following 11 scanners: |
Anti-Virus software | Software version | Detection |
Antiy-AVL |
1.0.0.1 |
GrayWare[AdWare:not-a-virus]/NSIS.Adwapper |
Avira |
7.11.174.142 |
ADWARE/CrossRider.Gen2 |
Clam AntiVirus |
0.98.4.0 |
Win.Adware.Adwapper |
ESET-NOD32 |
10465 |
a variant of Win32/Toolbar.CrossRider.AS |
Fortinet FortiGate |
5.1.152.0 |
Riskware/CrossRider |
IKARUS anti.virus |
T3.1.7.8.0 |
Trojan.GoogUpdate |
K7GW |
9.183.13490 |
Trojan ( 020000001 ) |
Qihoo-360 |
1.0.0.1015 |
HEUR/Malware.QVM03.Gen |
Sophos |
4.98.0 |
Generic PUA KN |
Symantec |
20141.1.0.330 |
WS.Reputation.1 |
Vba32 AntiVirus |
3.12.26.3 |
AdWare.Adwapper |
faef10ca-02e8-4c47-88b5-b9aa9ba2e52f-7.exe (547c838ade74b23bb503d12a20c87790) has been flagged by the following 10 scanners: |
Anti-Virus software | Software version | Detection |
AVware |
1.5.0.16 |
Crossrider (fs) |
Dr.Web |
7.0.10.8210 |
Trojan.Crossrider.33411 |
ESET-NOD32 |
10460 |
a variant of Win32/Toolbar.CrossRider.AQ |
Malwarebytes |
1.75.0.1 |
PUP.Optional.VideosMediaPlayer.A |
McAfee |
6.0.4.564 |
Artemis!547C838ADE74 |
McAfee-GW-Edition |
v2014.2 |
Artemis |
NANO AntiVirus |
0.28.2.62286 |
Trojan.Win32.Crossrider.dfiajk |
Panda Antivirus |
10.0.3.5 |
Trj/Genetic.gen |
Qihoo-360 |
1.0.0.1015 |
HEUR/Malware.QVM10.Gen |
VIPRE Antivirus |
33402 |
Crossrider (fs) |
faef10ca-02e8-4c47-88b5-b9aa9ba2e52f-5.exe (aa8acf56615bea6581aa9e7db0890954) has been flagged by the following 10 scanners: |
Anti-Virus software | Software version | Detection |
avast! |
8.0.1489.320 |
Win32:Crossrider-AO [PUP] |
AVware |
1.5.0.21 |
Crossrider (fs) |
ESET-NOD32 |
10569 |
a variant of Win32/Toolbar.CrossRider.AV |
G Data |
24 |
Win32.Adware.Crossrider.L |
Malwarebytes |
1.75.0.1 |
PUP.Optional.VideosMediaPlayer.A |
Qihoo-360 |
1.0.0.1015 |
HEUR/Malware.QVM10.Gen |
Rising Antivirus |
25.0.0.11 |
PE:Malware.Obscure!1.9C59 |
Symantec |
20141.1.0.330 |
WS.Reputation.1 |
Vba32 AntiVirus |
3.12.26.3 |
Trojan.GoogUpdate |
VIPRE Antivirus |
33952 |
Crossrider (fs) |
faef10ca-02e8-4c47-88b5-b9aa9ba2e52f-6.exe (c06ed1d4654b1b9dc2256ab0c2fc34e7) has been flagged by the following 10 scanners: |
Anti-Virus software | Software version | Detection |
Avira |
7.11.177.118 |
ADWARE/CrossRider.Gen4 |
AVware |
1.5.0.16 |
Crossrider (fs) |
Baidu-International |
3.5.1.41473 |
Adware.Win32.CrossAd.77 |
ESET-NOD32 |
10539 |
a variant of Win32/Toolbar.CrossRider.AV |
Kingsoft AntiVirus |
2013.4.9.267 |
Win32.Troj.NSIS.da.(kcloud) |
Malwarebytes |
1.75.0.1 |
PUP.Optional.VideosMediaPlayer.A |
Panda Antivirus |
10.0.4.2 |
Trj/Genetic.gen |
Symantec |
20141.1.0.330 |
WS.Reputation.1 |
Vba32 AntiVirus |
3.12.26.3 |
AdWare.Adwapper |
VIPRE Antivirus |
33784 |
Crossrider (fs) |
View all 60 all detections
videosMediaPlayers+ has been seen bundling various 3rd party software during the installation process. Make sure to check for and remove unused programs.
Program details
Displayed publisher: enter
URL: crossrider.com
Installation folder: C:\Program Files\videosmediaplayers+
Uninstaller: C:\Program Files\videosMediaPlayers+\Uninstall.exe /fcp=1
Estimated size: 18.98 MB
Files installed by videosMediaPlayers+
Program executable: | utils.exe |
Path: | C:\Program Files\videosmediaplayers+\utils.exe |
MD5: | a0b8e3f672619d453c38f8671b55d38d |
Additional files:
-
5d70b1a6-04f6-4b3b-82ca-7f051942e6d0.exe (by enter) - videosMediaPlayers+ (videosMediaPlayers+ exe)
-
faef10ca-02e8-4c47-88b5-b9aa9ba2e52f-11.exe (by enter)
-
faef10ca-02e8-4c47-88b5-b9aa9ba2e52f-2.exe
-
faef10ca-02e8-4c47-88b5-b9aa9ba2e52f-4.exe
-
(Malware detected) faef10ca-02e8-4c47-88b5-b9aa9ba2e52f-5.exe
-
(Malware detected) faef10ca-02e8-4c47-88b5-b9aa9ba2e52f-6.exe
-
faef10ca-02e8-4c47-88b5-b9aa9ba2e52f-64.exe
-
(Malware detected) faef10ca-02e8-4c47-88b5-b9aa9ba2e52f-7.exe
-
videosMediaPlayers+-bg.exe
-
(Malware detected) videosMediaPlayers+-bho.dll - videosMediaPlayers+ BHO
-
videosMediaPlayers+-bho64.dll
-
Interop.IWshRuntimeLibrary.dll - Assembly imported from type library 'IWshRuntimeLibrary'.
-
SuperSocket.ClientEngine.Common.dll (by SuperSocket) - SuperSocket ClientEngine (SuperSocket.ClientEngine.Common for .Net 2.0)
-
SuperSocket.ClientEngine.Core.dll (by SuperSocket) - SuperSocket.ClientEngine.Core for .NET 2.0
-
SuperSocket.ClientEngine.Protocol.dll - SuperSocket.ClientEngine.Protocol for .NET 2.0
-
WebSocket4Net.dll (by WebSocket4Net) - WebSocket4Net (WebSocket4Net for .NET 2.0)
-
(Malware detected) fdbdaafb-feea-4d35-aa3e-d287b9a8bfee.exe - Torpedo
-
51f3c0ca-28a5-4f12-842f-7351b33cf04f.crx
-
51f3c0ca-28a5-4f12-842f-7351b33cf04f.dll
-
5e750d24-5de4-47a2-b12d-a2e73108667c.crx
-
c4ad64cf-e6b1-4b6d-a44f-e6ce855dc6d7.dll
-
faef10ca-02e8-4c47-88b5-b9aa9ba2e52f.xpi
-
Uninstall.exe
Behaviors exhibited
Internet Explorer BHO
- videosMediaPlayers+-bho.dll is installed in Internet Explorer as a BHO (Browser Helper Object) under the name 'videosMediaPlayers+' with the class of {11111111-1111-1111-1111-110611421101} (fd6cd7a014e30132316d05dd4b6173a40064201).
8 Scheduled Tasks (Boot/Login)
- faef10ca-02e8-4c47-88b5-b9aa9ba2e52f-7.exe is automatically launched at startup through a scheduled task named faef10ca-02e8-4c47-88b5-b9aa9ba2e52f-1.
- fdbdaafb-feea-4d35-aa3e-d287b9a8bfee.exe is automatically launched at startup through a scheduled task named fdbdaafb-feea-4d35-aa3e-d287b9a8bfee.
- faef10ca-02e8-4c47-88b5-b9aa9ba2e52f-6.exe is automatically launched at startup through a scheduled task named faef10ca-02e8-4c47-88b5-b9aa9ba2e52f-6.
- faef10ca-02e8-4c47-88b5-b9aa9ba2e52f-5.exe is automatically launched at startup through a scheduled task named faef10ca-02e8-4c47-88b5-b9aa9ba2e52f-5_user.
- faef10ca-02e8-4c47-88b5-b9aa9ba2e52f-4.exe is automatically launched at startup through a scheduled task named faef10ca-02e8-4c47-88b5-b9aa9ba2e52f-4.
- faef10ca-02e8-4c47-88b5-b9aa9ba2e52f-11.exe is automatically launched at startup through a scheduled task named faef10ca-02e8-4c47-88b5-b9aa9ba2e52f-3.
Plus 2 more
How do I remove videosMediaPlayers+?
You can uninstall videosMediaPlayers+ from your computer by using the Add/Remove Program feature in the Window's Control Panel.
- On the Start menu (for Windows 8, right-click the screen's bottom-left corner), click Control Panel, and then, under Programs, do one of the following:
- Windows Vista/7/8/10: Click Uninstall a Program.
- Windows XP: Click Add or Remove Programs.
- When you find the program videosMediaPlayers+, click it, and then do one of the following:
- Windows Vista/7/8/10: Click Uninstall.
- Windows XP: Click the Remove or Change/Remove tab (to the right of the program).
- Follow the prompts. A progress bar shows you how long it will take to remove videosMediaPlayers+.
- If for some reason uninstallation fails, please install Microsoft's uninstall fixer utility which will help fix problems with programs that can't be uninstalled at support.microsoft.com.
How do I reset my web browser?
If your web browser homepage and search settings have been modfied by videosMediaPlayers+ you can restore them to their previous default settings.
Microsoft Internet Explorer
- Open Internet Explorer and click the Tools button, and then click Internet options.
- Click the Advanced tab, and then click Reset. Select the Delete personal settings check box if you would also like to remove search providers, Accelerators and home pages. When Internet Explorer finishes applying default settings, click Close, and then click OK.
- The changes will take effect the next time you open IE.
Mozilla Firefox
- At the top of the Firefox window, click the Firefox button, go over to the Help sub-menu and select Troubleshooting Information.
- To continue, click Reset Firefox in the confirmation window that opens. It will close and be reset.
- When it's done, a window will list the information that was imported. Click Finish and Firefox will open.
Google Chrome
- Open Chrome and click the Chrome menu on the browser toolbar.
- Select Settings. In the "Search" section, click Manage search engine. Check if (Default) is displayed next to your preferred search engine. If not, mouse over it and click Make default. Mouse over any other suspicious search engine entries that are not familiar and click X to remove them.
- When the "Show Home button" checkbox is selected, a web address appears below it. If you want the Homepage button to open up a different webpage, click Change to enter a link.
- Restart Google Chrome.
HOW IT STARTS
Scheduled task? Yes
(Runs on Windows boot)
|
|
USER ACTIONS
|
Uninstall it 82%
Keep it 18%
|
|
|
MOST USED OS
~99%
Windows 10
|
Geography
83.33% of installs come from the United States
Which countries install it?
United States |
83.33% |
United Kingdom |
16.67% |