kzpsysyuku.exe

King Gainer Lab

This adware is a web browser extension that will inject advertising in the browser in the form of unwanted banners and text-links which may link to malware sites and install unwanted software. The application kzpsysyuku.exe by King Gainer Lab has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Nullsoft Install System installer. It is also typically executed from the user's temporary directory. It is distributed as part of the Brightcircle group of browser-extensions.
Publisher:
King Gainer Lab  (signed and verified)

Version:
1.35.9.16

MD5:
9386f431641c4955bcf75d39cec0eac8

SHA-1:
a1e3626cb517e6ad5ea92422081efd567dfe62eb

SHA-256:
26c420758d7e63d775f35bcf26d0f03441c5d34cb9c80910620e401ff8249c3e

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
12/24/2024 1:59:52 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Brightcicrle (M)
16.9.18.4

File size:
12.1 MB (12,657,280 bytes)

File type:
Executable application (Win32 EXE)

Installer:
Nullsoft Install System

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\kzpsysyuku.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
8/18/2014 9:00:00 PM

Valid to:
8/19/2015 8:59:59 PM

Subject:
CN=King Gainer Lab, O=King Gainer Lab, STREET=Athinodorou 3, STREET=Dasoupoli Strovolos, L=Nicosia, S=Nicosia, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
10B5049C2559348D7A87203A148C790A

File PE Metadata
Compilation timestamp:
12/4/2012 11:55:02 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.22

CTPH (ssdeep):
393216:ID9ROwWT8hxplhzlyBkGt1+/or7GMI6izRv:IREwWm3hlsk1/oHBU

Entry address:
0x4323

Entry point:
55, 89, E5, 57, 56, 53, 81, EC, AC, 01, 00, 00, FF, 15, 74, C3, 44, 00, C7, 04, 24, 01, 80, 00, 00, FF, 15, 58, C4, 44, 00, 53, C7, 04, 24, 00, 00, 00, 00, FF, 15, 98, C4, 44, 00, 56, A3, 40, 3B, 44, 00, C7, 04, 24, 08, 00, 00, 00, E8, 8D, 3B, 00, 00, A3, 9C, 3B, 44, 00, 8D, 85, 84, FE, FF, FF, 57, C7, 44, 24, 10, 00, 00, 00, 00, C7, 44, 24, 0C, 60, 01, 00, 00, 89, 44, 24, 08, C7, 44, 24, 04, 00, 00, 00, 00, C7, 04, 24, 01, B3, 40, 00, FF, 15, AC, C4, 44, 00, 83, EC, 14, C7, 44, 24, 04, 02, B3, 40, 00, C7...
 
[+]

Code size:
34.5 KB (35,328 bytes)

Remove kzpsysyuku.exe - Powered by Reason Core Security