ljpikq.exe

Robokid Technologies

By using the Crossrider framework, this web extension is loaded in the web browser and displays advertisments on web pages not affiliated by the extension or company. These unwanted advertisements are injected by the extension in the browser in the form of common ad types such as banners and text-links. The application ljpikq.exe by Robokid Technologies has been detected as adware by 15 anti-malware scanners. The program is a setup application that uses the Nullsoft Install System installer. The installer uses the Solimba download manager to push adware offers during the download and setup process. Bundled adware includes search and shopping web browser toolbars. It is part of the Brightcircle group of web-extensions that inject advertisements in the browser.
Publisher:
Robokid Technologies  (signed and verified)

Version:
1.34.7.1

MD5:
ce242822dbd606164d1edd5f1fd6aced

SHA-1:
28969ee8d32249e6934aa08727c221619b6a8507

SHA-256:
c85de0a17042a84dab1aa545066aee6ee350b374fbca1fcdfb4015cebd262acd

Scanner detections:
15 / 68

Status:
Adware

Explanation:
Uses the Solimba installer to bundle adware offers.

Analysis date:
4/19/2024 9:20:35 AM UTC  (today)

Scan engine
Detection
Engine version

AegisLab AV Signature
AdWare.NSIS.Indirect
2.1.4+

AhnLab V3 Security
PUP/Win32.Solimba
2014.10.23

Avira AntiVirus
ADWARE/CrossRider.Gen
7.11.180.154

avast!
Adware-PR [PUP]
141003-0

AVG
Generic
2015.0.3313

Dr.Web
infected with Trojan.Crossrider.17413
9.0.1.05190

ESET NOD32
JS/Toolbar.Crossrider.B potentially unwanted application
7.0.302.0

G Data
Script.Application.Plush
14.10.24

IKARUS anti.virus
AdWare.CrossRider
t3scan.1.7.8.0

Kaspersky
not-a-virus:WebToolbar.Win32.CroRi
15.0.0.494

Malwarebytes
v2014.10.22.05

NANO AntiVirus
Trojan.Win32.Crossrider.dfojrr
0.28.2.62841

Reason Heuristics
PUP.RobokidTechnologies.G
14.10.22.17

Sophos
AppRider
4.98

Vba32 AntiVirus
Trojan.GoogUpdate
3.12.26.3

File size:
7.7 MB (8,076,576 bytes)

File type:
Executable application (Win32 EXE)

Installer:
Nullsoft Install System

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\ljpikq.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
6/23/2014 3:00:00 AM

Valid to:
6/24/2015 2:59:59 AM

Subject:
CN=Robokid Technologies, O=Robokid Technologies, STREET=Athinodorou 3 Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00ECF35E880AD0F3BC6F82DFB1F2E84CC0

File PE Metadata
Compilation timestamp:
12/4/2012 3:55:02 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.22

CTPH (ssdeep):
196608:kKeAVTRNl4mRFSosv5+yOMb4UVy/q2TjsTe/G:kJUVNxZ4MdMA/PoTeO

Entry address:
0x4323

Entry point:
55, 89, E5, 57, 56, 53, 81, EC, AC, 01, 00, 00, FF, 15, 74, C3, 44, 00, C7, 04, 24, 01, 80, 00, 00, FF, 15, 58, C4, 44, 00, 53, C7, 04, 24, 00, 00, 00, 00, FF, 15, 98, C4, 44, 00, 56, A3, 40, 3B, 44, 00, C7, 04, 24, 08, 00, 00, 00, E8, 8D, 3B, 00, 00, A3, 9C, 3B, 44, 00, 8D, 85, 84, FE, FF, FF, 57, C7, 44, 24, 10, 00, 00, 00, 00, C7, 44, 24, 0C, 60, 01, 00, 00, 89, 44, 24, 08, C7, 44, 24, 04, 00, 00, 00, 00, C7, 04, 24, 01, B3, 40, 00, FF, 15, AC, C4, 44, 00, 83, EC, 14, C7, 44, 24, 04, 02, B3, 40, 00, C7...
 
[+]

Code size:
34.5 KB (35,328 bytes)

Remove ljpikq.exe - Powered by Reason Core Security