banlnvrpg.exe

CinemaPlus-3.2cV02.06

Digit Network (Extreme White Limited)

The application banlnvrpg.exe, “CinemaPlus-3.2cV02.06 Installer” by Digit Network (Extreme White Limited) has been detected as adware by 22 anti-malware scanners. The program is a setup application that uses the Nullsoft Install System installer. It is built using the Crossrider cross-browser extension toolkit. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider. It is also typically executed from the user's temporary directory. While running, it connects to the Internet address hwcdn.net on port 80 using the HTTP protocol.
Publisher:
Cinema PlusV02.06  (signed by Digit Network (Extreme White Limited))

Product:
CinemaPlus-3.2cV02.06

Description:
CinemaPlus-3.2cV02.06 Installer

Version:
1.36.01.22

MD5:
d48806cb772a8362c8837d5cb38241f0

SHA-1:
e217d16ad62668515f62e7daddbe8d7523d90318

SHA-256:
0be52405167230f3428587721ceca785d07add9b03b9e102ef5e18831b377c4f

Scanner detections:
22 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Analysis date:
11/22/2024 9:33:34 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.JS.Crossrider.B
5639840

Avira AntiVirus
ADWARE/CrossRider.Gen7
8.3.1.6

avast!
Crossrider-ES [PUP]
150602-1

AVG
Crossrider
2016.0.3089

Bkav FE
W32.HfsAdware
1.3.0.6379

Dr.Web
Trojan.Crossrider.46916
9.0.1.0154

ESET NOD32
Win32/Toolbar.CrossRider.CM potentially unwanted application
7.0.302.0

Fortinet FortiGate
Riskware/CrossRider
6/3/2015

G Data
Script.Application.Plush
15.6.25

K7 AntiVirus
Adware
13.204.16124

Kaspersky
not-a-virus:WebToolbar.Win32.CrossRider
15.0.0.543

Malwarebytes
v2015.06.03.02

McAfee
Trojan.Artemis!FBB3A42646CE
18.0.204.0

MicroWorld eScan
Adware.JS.Crossrider.B
16.0.0.462

Panda Antivirus
Trj/CI.A
15.06.03.02

Qihoo 360 Security
HEUR/QVM30.1.Malware.Gen
1.0.0.1015

Reason Heuristics
PUP.ExtremeWhite.Installer
15.6.2.15

Trend Micro House Call
Suspici.5ABBC659
7.2.154

Trend Micro
ADW_CROSSRIDER
10.465.03

Vba32 AntiVirus
suspected of Trojan.Downloader.gen.h
3.12.26.4

VIPRE Antivirus
Threat.4150696
40786

Zillya! Antivirus
Trojan.BlackGen.Win32.11
2.0.0.2203

File size:
13.3 MB (13,966,048 bytes)

Copyright:
Copyright Cinema PlusV02.06

File type:
Executable application (Win32 EXE)

Installer:
Nullsoft Install System

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\banlnvrpg.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
4/14/2015 8:00:00 PM

Valid to:
4/14/2016 7:59:59 PM

Subject:
CN=Digit Network (Extreme White Limited), O=Digit Network (Extreme White Limited), STREET=Tassou Papadopulu 6 (flat/office 22), L=Nicosia, S=Agios Dometios, PostalCode=2373, C=CY

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00F39F5E5096779B72822CF8381166A432

File PE Metadata
Compilation timestamp:
12/4/2012 8:55:02 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.22

CTPH (ssdeep):
196608:yUMRrSLxAy95f6MTfSyGAn0WZERchXGYaMm92BmFUJqX47rA1g3Vu0gdOcsHQjpj:ylR+Wud6M+y9m4m92vw4M1g80gdXrl

Entry address:
0x4323

Entry point:
55, 89, E5, 57, 56, 53, 81, EC, AC, 01, 00, 00, FF, 15, 74, C3, 44, 00, C7, 04, 24, 01, 80, 00, 00, FF, 15, 58, C4, 44, 00, 53, C7, 04, 24, 00, 00, 00, 00, FF, 15, 98, C4, 44, 00, 56, A3, 40, 3B, 44, 00, C7, 04, 24, 08, 00, 00, 00, E8, 8D, 3B, 00, 00, A3, 9C, 3B, 44, 00, 8D, 85, 84, FE, FF, FF, 57, C7, 44, 24, 10, 00, 00, 00, 00, C7, 44, 24, 0C, 60, 01, 00, 00, 89, 44, 24, 08, C7, 44, 24, 04, 00, 00, 00, 00, C7, 04, 24, 01, B3, 40, 00, FF, 15, AC, C4, 44, 00, 83, EC, 14, C7, 44, 24, 04, 02, B3, 40, 00, C7...
 
[+]

Entropy:
7.9992  (probably packed)

Code size:
34.5 KB (35,328 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to s3-website-us-east-1.amazonaws.com  (54.231.16.164:80)

TCP (HTTP):
Connects to hwcdn.net  (69.16.175.10:80)

TCP (HTTP):
Connects to ec2-184-73-165-155.compute-1.amazonaws.com  (184.73.165.155:80)

Remove banlnvrpg.exe - Powered by Reason Core Security