{b1ce3ece-1927-4e6e-b064-2f9628964a7a}.dll

XVRNT

HypeNet

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The module {b1ce3ece-1927-4e6e-b064-2f9628964a7a}.dll, “TODO: <File description>” by HypeNet has been detected as adware by 30 anti-malware scanners. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
TODO: <Company name>  (signed by HypeNet)

Product:
XVRNT

Description:
TODO: <File description>

Version:
2.1.0.2

MD5:
831ab1432a03745b8893d1b4b4db3ae1

SHA-1:
b16c5e91184fe309111dabe112bfc43567d22fdf

SHA-256:
403b1e69e3632ddca4a6c22ab82d9ef5b28f083f94a83166845d3aed9398c488

Scanner detections:
30 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/27/2024 12:22:02 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.Agent.NYV
358

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
PUP/Win32.Agent
2014.08.25

Avira AntiVirus
APPL/BrowseFox.Gen
7.11.170.12

avast!
Win32:BrowseFox-C [PUP]
2014.9-160211

AVG
Generic
2017.0.2836

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.16211

Bitdefender
Adware.Agent.NYV
1.0.20.210

Clam AntiVirus
Win.Adware.Swiftbrowse-20
0.98/21411

Dr.Web
Trojan.BPlug.214
9.0.1.042

Emsisoft Anti-Malware
Adware.Agent.NYV
8.16.02.11.08

ESET NOD32
Win32/BrowseFox.M potentially unwanted application
10.7.0.302.0

Fortinet FortiGate
Riskware/BrowseFox
2/11/2016

F-Prot
W32/MegaBrowse.A
v6.4.6.5.141

F-Secure
Adware.Agent.NYV
11.2016-11-02_5

G Data
Adware.Agent.NYV
16.2.24

IKARUS anti.virus
AdWare.BrowseBurst
t3scan.1.7.5.0

Kaspersky
not-a-virus:AdWare.Win32.Agent
14.0.0.676

McAfee
Artemis!842EDB4C77B1
5600.6492

MicroWorld eScan
Adware.Agent.NYV
17.0.0.126

NANO AntiVirus
Trojan.Win32.BPlug.decyqf
0.28.2.61721

nProtect
Adware.Agent.NYV
14.03.30.01

Panda Antivirus
Trj/CI.A
16.02.11.08

Qihoo 360 Security
HEUR/Malware.QVM30.Gen
1.0.0.1015

Reason Heuristics
PUP.Yontoo.HypeNet (M)
16.2.11.20

Sophos
Generic PUA CG
4.98

Trend Micro House Call
Suspicious_GEN.F47V0701
7.2.42

Vba32 AntiVirus
AdWare.Kranet
3.12.26.3

VIPRE Antivirus
Adware.SearchProtect
32498

Zillya! Antivirus
Adware.Kranet.Win32.17
2.0.0.1900

File size:
289.3 KB (296,216 bytes)

Product version:
2.1.0.2

Copyright:
TODO: (c) <Company name>. All rights reserved.

Original file name:
XTLS.dll

File type:
Dynamic link library (Win32 DLL)

Common path:
C:\Program Files\hypenet\bin\{b1ce3ece-1927-4e6e-b064-2f9628964a7a}.dll

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/9/2014 3:00:00 AM

Valid to:
1/10/2015 2:59:59 AM

Subject:
CN=HypeNet, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=HypeNet, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
1FBAF70F51194AE01BD4FAB2931DA43A

File PE Metadata
Compilation timestamp:
4/30/2014 2:20:28 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
3072:KMIwkOaVc3OotsrAEM2kVUFxXYNO0A/LKJeeJnXVL2TjXOCbq2xqoIfTean8S75m:KMIwk72laQGW/spGXV2GCbqZoIfhVHhu

Entry address:
0x21C37

Entry point:
8B, FF, 55, 8B, EC, 83, 7D, 0C, 01, 75, 05, E8, CB, 84, 00, 00, FF, 75, 08, 8B, 4D, 10, 8B, 55, 0C, E8, EC, FE, FF, FF, 59, 5D, C2, 0C, 00, B8, 57, AC, 02, 10, A3, 88, 23, 04, 10, C7, 05, 8C, 23, 04, 10, 4D, A3, 02, 10, C7, 05, 90, 23, 04, 10, 01, A3, 02, 10, C7, 05, 94, 23, 04, 10, 3A, A3, 02, 10, C7, 05, 98, 23, 04, 10, A3, A2, 02, 10, A3, 9C, 23, 04, 10, C7, 05, A0, 23, 04, 10, CF, AB, 02, 10, C7, 05, A4, 23, 04, 10, BF, A2, 02, 10, C7, 05, A8, 23, 04, 10, 21, A2, 02, 10, C7, 05, AC, 23, 04, 10, AD, A1...
 
[+]

Code size:
204 KB (208,896 bytes)

Remove {b1ce3ece-1927-4e6e-b064-2f9628964a7a}.dll - Powered by Reason Core Security