enzvlgfkz.exe

CinemaPlus-3.2cV31.05

Digit Network (Extreme White Limited)

The application enzvlgfkz.exe, “CinemaPlus-3.2cV31.05 Installer” by Digit Network (Extreme White Limited) has been detected as adware by 24 anti-malware scanners. The program is a setup application that uses the Nullsoft Install System installer. It is built using the Crossrider cross-browser extension toolkit. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider. It is also typically executed from the user's temporary directory. While running, it connects to the Internet address tlb.hwcdn.net on port 80 using the HTTP protocol.
Publisher:
Cinema PlusV31.05  (signed by Digit Network (Extreme White Limited))

Product:
CinemaPlus-3.2cV31.05

Description:
CinemaPlus-3.2cV31.05 Installer

Version:
1.36.01.22

MD5:
5c27aa09add6a43a90f821e9dafbf62f

SHA-1:
e9c1ca01a37864a3d6cbfb270037a7fb0b442ed0

SHA-256:
ed9f17a4f6ec0c4296f5b0cdb653cec4511e423b229c534d9cc23a4e74dcd82e

Scanner detections:
24 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Analysis date:
4/26/2024 7:22:50 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.JS.Crossrider.B
605

Avira AntiVirus
ADWARE/CrossRider.Gen7
8.3.1.6

avast!
Win32:Malware-gen
2014.9-150609

AVG
Crossrider
2016.0.3083

Bkav FE
W32.HfsAdware
1.3.0.6379

Dr.Web
Trojan.Crossrider.46916
9.0.1.0160

ESET NOD32
Win32/Toolbar.CrossRider.CM potentially unwanted (variant)
9.11733

Fortinet FortiGate
Riskware/CrossRider
6/9/2015

G Data
Script.Application.Plush
15.6.25

K7 AntiVirus
Adware
13.204.16137

Kaspersky
not-a-virus:WebToolbar.Win32.CrossRider
14.0.0.1912

Malwarebytes
v2015.06.09.04

McAfee
Artemis!0279D03A85ED
5600.6739

MicroWorld eScan
Adware.JS.Crossrider.B
16.0.0.480

NANO AntiVirus
Riskware.Win32.CrossRider.dskpif
0.30.24.1636

Panda Antivirus
Trj/CI.A
15.06.09.04

Qihoo 360 Security
Win32/Virus.WebToolbar.330
1.0.0.1015

Reason Heuristics
PUP.ExtremeWhite.Installer
15.6.9.16

Rising Antivirus
PE:Malware.Obscure!1.9C59
23.00.65.15607

Trend Micro House Call
Suspici.9DDE4AEF
7.2.160

Trend Micro
ADW_CROSSRIDER
10.465.09

Vba32 AntiVirus
suspected of Trojan.Downloader.gen.h
3.12.26.4

VIPRE Antivirus
Trojan.Win32.Generic
40824

Zillya! Antivirus
Trojan.BlackGen.Win32.11
2.0.0.2206

File size:
13.7 MB (14,327,016 bytes)

Copyright:
Copyright Cinema PlusV31.05

File type:
Executable application (Win32 EXE)

Installer:
Nullsoft Install System

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\enzvlgfkz.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
4/14/2015 8:00:00 PM

Valid to:
4/14/2016 7:59:59 PM

Subject:
CN=Digit Network (Extreme White Limited), O=Digit Network (Extreme White Limited), STREET=Tassou Papadopulu 6 (flat/office 22), L=Nicosia, S=Agios Dometios, PostalCode=2373, C=CY

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00F39F5E5096779B72822CF8381166A432

File PE Metadata
Compilation timestamp:
12/4/2012 10:55:02 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.22

CTPH (ssdeep):
393216:/mU1LjTvO7hsQJyBp4kK6d06o4ltesWnXHKiBphh:e6j67iQ8phK6CLEeHXFBphh

Entry address:
0x4323

Entry point:
55, 89, E5, 57, 56, 53, 81, EC, AC, 01, 00, 00, FF, 15, 74, C3, 44, 00, C7, 04, 24, 01, 80, 00, 00, FF, 15, 58, C4, 44, 00, 53, C7, 04, 24, 00, 00, 00, 00, FF, 15, 98, C4, 44, 00, 56, A3, 40, 3B, 44, 00, C7, 04, 24, 08, 00, 00, 00, E8, 8D, 3B, 00, 00, A3, 9C, 3B, 44, 00, 8D, 85, 84, FE, FF, FF, 57, C7, 44, 24, 10, 00, 00, 00, 00, C7, 44, 24, 0C, 60, 01, 00, 00, 89, 44, 24, 08, C7, 44, 24, 04, 00, 00, 00, 00, C7, 04, 24, 01, B3, 40, 00, FF, 15, AC, C4, 44, 00, 83, EC, 14, C7, 44, 24, 04, 02, B3, 40, 00, C7...
 
[+]

Code size:
34.5 KB (35,328 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to tlb.hwcdn.net  (69.16.175.42:80)

TCP (HTTP):
Connects to s3-website-us-east-1.amazonaws.com  (54.231.112.18:80)

TCP (HTTP):
Connects to ec2-23-21-225-0.compute-1.amazonaws.com  (23.21.225.0:80)

Remove enzvlgfkz.exe - Powered by Reason Core Security