bhkmdw.exe

CinemaPlus-3.2cV15.06

Digit Network (Extreme White Limited)

The application bhkmdw.exe, “CinemaPlus-3.2cV15.06 Installer” by Digit Network (Extreme White Limited) has been detected as adware by 23 anti-malware scanners. The program is a setup application that uses the Nullsoft Install System installer. It is built using the Crossrider cross-browser extension platform. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider. It is also typically executed from the user's temporary directory. While running, it connects to the Internet address tlb.hwcdn.net on port 80 using the HTTP protocol.
Publisher:
Cinema PlusV15.06  (signed by Digit Network (Extreme White Limited))

Product:
CinemaPlus-3.2cV15.06

Description:
CinemaPlus-3.2cV15.06 Installer

Version:
1.36.01.22

MD5:
ecb45b971a1ddd668d4813669f4e7e01

SHA-1:
10329722c4f8ddde84a455962f1b92721a82400f

SHA-256:
06e84cace5a4699958f9d6775b01419a98d5ee460d8f9ec10f1addb4a361ecae

Scanner detections:
23 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Analysis date:
1/12/2025 2:57:36 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.JS.Crossrider.B
5768731

AhnLab V3 Security
PUP/Win32.CrossRider
2015.06.16

Avira AntiVirus
ADWARE/CrossRider.Gen7
8.3.1.6

AVG
Crossrider
2016.0.3077

Bkav FE
W32.HfsAdware
1.3.0.6379

Dr.Web
Trojan.Crossrider.46916
9.0.1.0167

ESET NOD32
Win32/Toolbar.CrossRider.CM potentially unwanted application
7.0.302.0

Fortinet FortiGate
Riskware/CrossRider
6/16/2015

G Data
Script.Application.Plush
15.6.25

K7 AntiVirus
Unwanted-Program
13.205.16251

Kaspersky
not-a-virus:WebToolbar.Win32.CrossRider
15.0.0.543

Malwarebytes
v2015.06.16.02

MicroWorld eScan
Adware.JS.Crossrider.B
16.0.0.501

NANO AntiVirus
Riskware.Script.Crossrider.dsnmop
0.30.24.2086

Panda Antivirus
Trj/Genetic.gen
15.06.16.02

Qihoo 360 Security
Win32/Virus.Adware.a87
1.0.0.1015

Quick Heal
JS.Adware.CrossRider.A
6.15.14.00

Reason Heuristics
PUP.ExtremeWhite.Installer
15.6.15.22

Rising Antivirus
PE:Malware.Adload!6.1D9D
23.00.65.15614

Trend Micro House Call
Suspici.AAC3522D
7.2.167

Trend Micro
ADW_CROSSRIDER
10.465.16

Vba32 AntiVirus
suspected of Trojan.Downloader.gen.h
3.12.26.4

Zillya! Antivirus
Trojan.BlackGen.Win32.11
2.0.0.2225

File size:
13.4 MB (14,036,256 bytes)

Copyright:
Copyright Cinema PlusV15.06

File type:
Executable application (Win32 EXE)

Installer:
Nullsoft Install System

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\bhkmdw.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
4/14/2015 7:00:00 PM

Valid to:
4/14/2016 6:59:59 PM

Subject:
CN=Digit Network (Extreme White Limited), O=Digit Network (Extreme White Limited), STREET=Tassou Papadopulu 6 (flat/office 22), L=Nicosia, S=Agios Dometios, PostalCode=2373, C=CY

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00F39F5E5096779B72822CF8381166A432

File PE Metadata
Compilation timestamp:
12/4/2012 7:55:02 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.22

CTPH (ssdeep):
196608:odPHUkeCcjKqCEP4LLEuBvZp2B36HiIl4vt7JRjOy8dlJNUTEm8bgCTCMRVN08lD:HKUw/Eu9nbCzVrCDdagmtMRr1cigPq

Entry address:
0x4323

Entry point:
55, 89, E5, 57, 56, 53, 81, EC, AC, 01, 00, 00, FF, 15, 74, C3, 44, 00, C7, 04, 24, 01, 80, 00, 00, FF, 15, 58, C4, 44, 00, 53, C7, 04, 24, 00, 00, 00, 00, FF, 15, 98, C4, 44, 00, 56, A3, 40, 3B, 44, 00, C7, 04, 24, 08, 00, 00, 00, E8, 8D, 3B, 00, 00, A3, 9C, 3B, 44, 00, 8D, 85, 84, FE, FF, FF, 57, C7, 44, 24, 10, 00, 00, 00, 00, C7, 44, 24, 0C, 60, 01, 00, 00, 89, 44, 24, 08, C7, 44, 24, 04, 00, 00, 00, 00, C7, 04, 24, 01, B3, 40, 00, FF, 15, AC, C4, 44, 00, 83, EC, 14, C7, 44, 24, 04, 02, B3, 40, 00, C7...
 
[+]

Entropy:
7.9992  (probably packed)

Code size:
34.5 KB (35,328 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to tlb.hwcdn.net  (69.16.175.10:80)

TCP (HTTP):
Connects to s3-website-us-east-1.amazonaws.com  (54.231.66.100:80)

TCP (HTTP):
Connects to ec2-54-235-66-200.compute-1.amazonaws.com  (54.235.66.200:80)

TCP (HTTP):
Connects to ec2-54-197-245-182.compute-1.amazonaws.com  (54.197.245.182:80)

Remove bhkmdw.exe - Powered by Reason Core Security