eokcvrw.exe

Xenon Play Center

This adware is a web browser extension that will inject advertising in the browser in the form of unwanted banners and text-links which may link to malware sites and install unwanted software. The application eokcvrw.exe by Xenon Play Center has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Nullsoft Install System installer. It is also typically executed from the user's temporary directory. It is part of the Brightcircle group of web-extensions that inject advertisements in the browser.
Publisher:
${randomstring1} LTD  (signed by Xenon Play Center)

Description:
${randomstring4}

Version:
1.35.9.29

MD5:
f3e1e701c63c899bb0a580daceb0d72b

SHA-1:
89033603eecaa4699b5484b689e70885d7297d76

SHA-256:
93979efedf2fbfd0557aa4ab8b783ca2335a2ce49a323a1aed4cf03d53d2bbd2

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
11/23/2024 8:07:50 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Brightcircle (M)
16.12.12.2

File size:
12 MB (12,593,656 bytes)

Copyright:
Copyright ${randomstring3}

Trademarks:
${randomstring2} is a trademark of ${randomstring6}

File type:
Executable application (Win32 EXE)

Installer:
Nullsoft Install System

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\eokcvrw.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
10/19/2014 5:00:00 PM

Valid to:
10/20/2015 4:59:59 PM

Subject:
CN=Xenon Play Center, O=Xenon Play Center, STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
69BADB8E273451C7DEA87ADDB50705F2

File PE Metadata
Compilation timestamp:
12/4/2012 5:55:02 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.22

Entry address:
0x4323

Entry point:
55, 89, E5, 57, 56, 53, 81, EC, AC, 01, 00, 00, FF, 15, 74, C3, 44, 00, C7, 04, 24, 01, 80, 00, 00, FF, 15, 58, C4, 44, 00, 53, C7, 04, 24, 00, 00, 00, 00, FF, 15, 98, C4, 44, 00, 56, A3, 40, 3B, 44, 00, C7, 04, 24, 08, 00, 00, 00, E8, 8D, 3B, 00, 00, A3, 9C, 3B, 44, 00, 8D, 85, 84, FE, FF, FF, 57, C7, 44, 24, 10, 00, 00, 00, 00, C7, 44, 24, 0C, 60, 01, 00, 00, 89, 44, 24, 08, C7, 44, 24, 04, 00, 00, 00, 00, C7, 04, 24, 01, B3, 40, 00, FF, 15, AC, C4, 44, 00, 83, EC, 14, C7, 44, 24, 04, 02, B3, 40, 00, C7...
 
[+]

Entropy:
7.9990  (probably packed)

Code size:
34.5 KB (35,328 bytes)

Remove eokcvrw.exe - Powered by Reason Core Security