{3b232d24-d5de-4194-b4d7-d53b41a09748}.dll

XVRNT

lucky leap

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The module {3b232d24-d5de-4194-b4d7-d53b41a09748}.dll, “TODO: <File description>” by lucky leap has been detected as adware by 28 anti-malware scanners. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
TODO: <Company name>  (signed by lucky leap)

Product:
XVRNT

Description:
TODO: <File description>

Version:
2.1.0.3

MD5:
5610150d00c3a02926652a95de8ad48a

SHA-1:
e5f69d503b14d4de637c1fab2a4f1b615b27ccef

SHA-256:
0a180a7b7db024d1adf63a781c3edc7123ce193114b6f2b40d89bab1ae6734d9

Scanner detections:
28 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/19/2024 4:02:55 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.Agent.NYV
358

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
PUP/Win32.Agent
2014.08.25

Avira AntiVirus
APPL/BrowseFox.Gen
7.11.170.170

avast!
Win32:BrowseFox-C [PUP]
2014.9-160212

AVG
Generic
2017.0.2836

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.16212

Bitdefender
Adware.Agent.NYV
1.0.20.215

Clam AntiVirus
Win.Adware.Swiftbrowse-20
0.98/21411

Dr.Web
Trojan.BPlug.100
9.0.1.043

Emsisoft Anti-Malware
Adware.Agent.NYV
8.16.02.12.10

ESET NOD32
Win32/BrowseFox.M potentially unwanted application
10.7.0.302.0

F-Prot
W32/MegaBrowse.A
v6.4.6.5.141

F-Secure
Adware.Agent.NYV
11.2016-12-02_6

G Data
Adware.Agent.NYV
16.2.24

IKARUS anti.virus
AdWare.BrowseBurst
t3scan.1.7.5.0

Kaspersky
not-a-virus:AdWare.Win32.Agent
14.0.0.673

McAfee
Artemis!842EDB4C77B1
5600.6492

MicroWorld eScan
Adware.Agent.NYV
17.0.0.129

NANO AntiVirus
Trojan.Win32.BPlug.decyqf
0.28.2.61721

nProtect
Adware.Agent.NYV
14.03.30.01

Panda Antivirus
Trj/CI.A
16.02.12.10

Qihoo 360 Security
HEUR/Malware.QVM30.Gen
1.0.0.1015

Reason Heuristics
PUP.Yontoo.luckyleap (M)
16.2.12.10

Sophos
Generic PUA CG
4.98

Vba32 AntiVirus
AdWare.Kranet
3.12.26.3

VIPRE Antivirus
Adware.SearchProtect
32498

Zillya! Antivirus
Adware.Kranet.Win32.17
2.0.0.1900

File size:
290.3 KB (297,248 bytes)

Product version:
2.1.0.3

Copyright:
TODO: (c) <Company name>. All rights reserved.

Original file name:
XTLS.dll

File type:
Dynamic link library (Win32 DLL)

Language:
English (United States)

Common path:
C:\Program Files\lucky leap\bin\{3b232d24-d5de-4194-b4d7-d53b41a09748}.dll

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
8/13/2013 7:00:00 AM

Valid to:
8/14/2015 6:59:59 AM

Subject:
CN=lucky leap, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=lucky leap, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
6A5011DFCDBB457548BCC92ED7587788

File PE Metadata
Compilation timestamp:
7/8/2014 1:15:14 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
6144:qMWWlJqaR0i8de0V6WLedcAL2lb1ucFmJP840fsX:v7zBRnnS6WSbL2lb1ucFmd8I

Entry address:
0x21E77

Entry point:
8B, FF, 55, 8B, EC, 83, 7D, 0C, 01, 75, 05, E8, EB, 84, 00, 00, FF, 75, 08, 8B, 4D, 10, 8B, 55, 0C, E8, EC, FE, FF, FF, 59, 5D, C2, 0C, 00, B8, B7, AE, 02, 10, A3, 88, 33, 04, 10, C7, 05, 8C, 33, 04, 10, AD, A5, 02, 10, C7, 05, 90, 33, 04, 10, 61, A5, 02, 10, C7, 05, 94, 33, 04, 10, 9A, A5, 02, 10, C7, 05, 98, 33, 04, 10, 03, A5, 02, 10, A3, 9C, 33, 04, 10, C7, 05, A0, 33, 04, 10, 2F, AE, 02, 10, C7, 05, A4, 33, 04, 10, 1F, A5, 02, 10, C7, 05, A8, 33, 04, 10, 81, A4, 02, 10, C7, 05, AC, 33, 04, 10, 0D, A4...
 
[+]

Entropy:
6.5003

Code size:
205 KB (209,920 bytes)

Remove {3b232d24-d5de-4194-b4d7-d53b41a09748}.dll - Powered by Reason Core Security