bsuogjakwnvply.exe

Xenon Play Center

This adware is a web browser extension that will inject advertising in the browser in the form of unwanted banners and text-links which may link to malware sites and install unwanted software. The application bsuogjakwnvply.exe by Xenon Play Center has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Nullsoft Install System installer. It is also typically executed from the user's temporary directory. It is part of the Brightcircle group of web-extensions that inject advertisements in the browser.
Publisher:
Xenon Play Center  (signed and verified)

Version:
1.35.9.29

MD5:
75298da3cd356aef512f86edf31d288a

SHA-1:
054c074c7ecbc86d01343319166ab4c95f1e1711

SHA-256:
f89a175e5b31810ac8f549140d27ad91d61bf37c11d345441dd5ef818fd8c353

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
11/23/2024 7:26:53 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Brightcircle (M)
16.10.26.13

File size:
11 MB (11,567,624 bytes)

File type:
Executable application (Win32 EXE)

Installer:
Nullsoft Install System

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\bsuogjakwnvply.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
10/19/2014 10:00:00 PM

Valid to:
10/20/2015 9:59:59 PM

Subject:
CN=Xenon Play Center, O=Xenon Play Center, STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
69BADB8E273451C7DEA87ADDB50705F2

File PE Metadata
Compilation timestamp:
12/4/2012 11:55:02 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.22

CTPH (ssdeep):
196608:ObinqUuRT1Ev7shEXEJyrSa4A22usOH7S0jmoNDa/uocnngDHBqzXPTaNtYHIz:sAqZ1ETsloT4A1us07SimuKQnCHMg0Iz

Entry address:
0x4323

Entry point:
55, 89, E5, 57, 56, 53, 81, EC, AC, 01, 00, 00, FF, 15, 74, C3, 44, 00, C7, 04, 24, 01, 80, 00, 00, FF, 15, 58, C4, 44, 00, 53, C7, 04, 24, 00, 00, 00, 00, FF, 15, 98, C4, 44, 00, 56, A3, 40, 3B, 44, 00, C7, 04, 24, 08, 00, 00, 00, E8, 8D, 3B, 00, 00, A3, 9C, 3B, 44, 00, 8D, 85, 84, FE, FF, FF, 57, C7, 44, 24, 10, 00, 00, 00, 00, C7, 44, 24, 0C, 60, 01, 00, 00, 89, 44, 24, 08, C7, 44, 24, 04, 00, 00, 00, 00, C7, 04, 24, 01, B3, 40, 00, FF, 15, AC, C4, 44, 00, 83, EC, 14, C7, 44, 24, 04, 02, B3, 40, 00, C7...
 
[+]

Code size:
34.5 KB (35,328 bytes)

Remove bsuogjakwnvply.exe - Powered by Reason Core Security