{4df60d2c-927b-478c-83f0-b7dc923bae60}.dll

XVRNT

Yula

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The module {4df60d2c-927b-478c-83f0-b7dc923bae60}.dll, “TODO: <File description>” by Yula has been detected as adware by 20 anti-malware scanners. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
TODO: <Company name>  (signed by Yula)

Product:
XVRNT

Description:
TODO: <File description>

Version:
2.1.0.3

MD5:
d78d326271dbf75ec5c744b5ee0ab753

SHA-1:
2b46f7c5867407bff69070da2e15f60e25c5684b

SHA-256:
6a3aa1b48912b04b3f7415ef68f69b20231b8fc81e6ca5c018a6c9b66012af03

Scanner detections:
20 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/26/2024 7:37:52 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.BrowseFox.D
925

Agnitum Outpost
Riskware.Agent
7.1.1

AVG
Zula
2015.0.3403

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.14725

Bitdefender
Adware.BrowseFox.D
1.0.20.1030

Clam AntiVirus
Win.Adware.Swiftbrowse-57
0.98/19185

Dr.Web
Trojan.BPlug.102
9.0.1.05190

Emsisoft Anti-Malware
Adware.BrowseFox
8.14.07.25.11

ESET NOD32
Win32/BrowseFox.K potentially unwanted application
7.0.302.0

F-Prot
W32/MegaBrowse.A
v6.4.6.5.141

F-Secure
Adware.BrowseFox.D
11.2014-25-07_6

G Data
Adware.BrowseFox
14.7.24

IKARUS anti.virus
AdWare.SwiftBrowse
t3scan.1.6.1.0

Kaspersky
not-a-virus:AdWare.Win32.Yotoon
15.0.0.494

MicroWorld eScan
Adware.BrowseFox.D
15.0.0.618

nProtect
Adware.BrowseFox.D
14.07.25.01

Reason Heuristics
PUP.Yula.g
14.7.25.11

Vba32 AntiVirus
AdWare.Agent
3.12.26.3

VIPRE Antivirus
Threat.4150696
29708

Zillya! Antivirus
Adware.SwiftBrowse.Win32.7
2.0.0.1845

File size:
290.3 KB (297,240 bytes)

Product version:
2.1.0.3

Copyright:
TODO: (c) <Company name>. All rights reserved.

Original file name:
XTLS.dll

File type:
Dynamic link library (Win32 DLL)

Language:
English (United States)

Common path:
C:\Program Files\yula\bin\{4df60d2c-927b-478c-83f0-b7dc923bae60}.dll

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
3/15/2014 12:00:00 AM

Valid to:
3/15/2015 11:59:59 PM

Subject:
CN=Yula, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Yula, L=Santa Monica, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
4B2C13D47B877663487D003C021E7110

File PE Metadata
Compilation timestamp:
7/8/2014 7:15:14 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
6144:AMWWlJqaR0i8de0V6WLedcAL2lb1ucFmJP840fsN:57zBRnnS6WSbL2lb1ucFmd8G

Entry address:
0x21E77

Entry point:
8B, FF, 55, 8B, EC, 83, 7D, 0C, 01, 75, 05, E8, EB, 84, 00, 00, FF, 75, 08, 8B, 4D, 10, 8B, 55, 0C, E8, EC, FE, FF, FF, 59, 5D, C2, 0C, 00, B8, B7, AE, 02, 10, A3, 88, 33, 04, 10, C7, 05, 8C, 33, 04, 10, AD, A5, 02, 10, C7, 05, 90, 33, 04, 10, 61, A5, 02, 10, C7, 05, 94, 33, 04, 10, 9A, A5, 02, 10, C7, 05, 98, 33, 04, 10, 03, A5, 02, 10, A3, 9C, 33, 04, 10, C7, 05, A0, 33, 04, 10, 2F, AE, 02, 10, C7, 05, A4, 33, 04, 10, 1F, A5, 02, 10, C7, 05, A8, 33, 04, 10, 81, A4, 02, 10, C7, 05, AC, 33, 04, 10, 0D, A4...
 
[+]

Code size:
205 KB (209,920 bytes)

Remove {4df60d2c-927b-478c-83f0-b7dc923bae60}.dll - Powered by Reason Core Security