zkc.exe

videos+ MediaPlayer+

Pani Poni Network

This adware is a web browser extension that will inject advertising in the browser in the form of unwanted banners and text-links which may link to malware sites and install unwanted software. The application zkc.exe, “videos+ MediaPlayer+ exe” by Pani Poni Network has been detected as adware by 17 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered to execute each time a user logs in. This file is typically installed with the program videos+ MediaPlayer+ by Gogo Network Club which is a potentially unwanted software program. It is built using the Crossrider cross-browser extension toolkit. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider. It is part of the Brightcircle group of web-extensions that inject advertisements in the browser.
Publisher:
enter  (signed by Pani Poni Network)

Product:
videos+ MediaPlayer+

Description:
videos+ MediaPlayer+ exe

Version:
1000.1000.1000.1000

MD5:
5b34ae2e1dbb91bd2c4be93caf863203

SHA-1:
6a395e695c6d25b79787f6a2e0b419291836592b

SHA-256:
6d6566fbc193d4a22a4fe1a84a3662c05ef2bb9a8845bdf20e16a721fef9f038

Scanner detections:
17 / 68

Status:
Adware

Explanation:
The software may change the browser's home page and search provider settings as well as display advertisements.

Analysis date:
12/25/2024 5:18:19 PM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
PUP/Win32.CrossRider
2014.09.19

Avira AntiVirus
ADWARE/CrossRider.Gen7
7.11.173.60

AVG
Generic
2015.0.3342

Baidu Antivirus
PUA.Win32.CrossRider
4.0.3.141123

Dr.Web
Trojan.Crossrider.31451
9.0.1.0267

ESET NOD32
Win32/Toolbar.CrossRider.AQ potentially unwanted application
8.7.0.302.0

G Data
Win32.Adware.Crossrider
14.9.24

K7 AntiVirus
Adware
13.183.13393

Kaspersky
not-a-virus:AdWare.NSIS.Adwapper
14.0.0.3203

Malwarebytes
PUP.Optional.TornTV.A
v2014.09.18.06

McAfee
Artemis!38CB07508EFE
5600.6938

NANO AntiVirus
Riskware.Win32.Crossrider.dffcko
0.28.2.62151

Panda Antivirus
Trj/Genetic.gen
14.09.18.06

Reason Heuristics
PUP.Task.PaniPoniNetwork.D
14.9.19.12

Sophos
Generic PUA PE
4.98

VIPRE Antivirus
Threat.4789396
32938

File size:
1.5 MB (1,524,128 bytes)

Product version:
1000.1000.1000.1000

Copyright:
Copyright 2011

Original file name:
videos+ MediaPlayer+.exe

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\roaming\zkc.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
8/27/2014 6:00:00 PM

Valid to:
8/28/2015 5:59:59 PM

Subject:
CN=Pani Poni Network, O=Pani Poni Network, STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00D7E501E7ADAA5764867C0B6158D78CDF

File PE Metadata
Compilation timestamp:
9/16/2014 4:10:16 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
24576:m3fj4lmuG9l8mayxZbfeexxjOto4L3IZsb6tDfwjyMLAepSi354THL47:N2z1bbme3UouLb6tWLAepSi3CTU7

Entry address:
0xEE830

Entry point:
E8, B9, 00, 01, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 56, 8B, 75, 08, 85, F6, 78, 09, E8, EC, 01, 01, 00, 3B, 30, 7C, 07, E8, E3, 01, 01, 00, 8B, 30, E8, D6, 01, 01, 00, 8B, 04, B0, 5E, 5D, C3, 55, 8B, EC, 56, E8, 34, 5F, 00, 00, 8B, F0, 85, F6, 75, 07, B8, E0, 40, 55, 00, EB, 26, 53, 57, 33, FF, BB, 86, 00, 00, 00, 39, 7E, 24, 75, 1B, 6A, 01, 53, E8, 7E, 31, 00, 00, 59, 59, 89, 46, 24, 85, C0, 75, 0A, B8, E0, 40, 55, 00, 5F, 5B, 5E, 5D, C3, FF, 75, 08, 8B, 76, 24, E8, 90, FF, FF, FF, 50, 53, 56, E8, 35, EE...
 
[+]

Entropy:
6.6151

Code size:
1.1 MB (1,147,392 bytes)

Scheduled Task
Task name:
ZKC

Trigger:
Logon (Runs on logon)


The file zkc.exe has been discovered within the following program.

videos+ MediaPlayer+  by Gogo Network Club
This is a potentially unwanted adware program that injects ads into the user's browser. This includes inserting into web pages or displaying ads over parts of existing web page advertisements, banners, coupons or text links that would not otherwise appear.
crossrider.com
88% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communication in live environments.

TCP (HTTP):
Connects to ip-50-63-202-37.ip.secureserver.net  (50.63.202.37:80)

Remove zkc.exe - Powered by Reason Core Security