{cc30460f-753f-44d9-b58c-13dae1321968}.dll

XVRNT

Jump Flip

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The module {cc30460f-753f-44d9-b58c-13dae1321968}.dll, “TODO: <File description>” by Jump Flip has been detected as adware by 22 anti-malware scanners. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
TODO: <Company name>  (signed by Jump Flip)

Product:
XVRNT

Description:
TODO: <File description>

Version:
2.1.0.2

MD5:
d9a68d116ef11e0c10e95a8c55709bd3

SHA-1:
a6238106119e9d782a254713a07edfa6cc7d640c

SHA-256:
533ce9834dbb55f6625cda00250d72cc9250f911ef4e60e48d455d6bb4316d36

Scanner detections:
22 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/25/2024 4:46:41 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.Agent.OCH
952

Agnitum Outpost
PUA.Agent
7.1.1

AVG
Adware Generic_r
2015.0.3430

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.14627

Bitdefender
Adware.Agent.OCH
1.0.20.890

Dr.Web
Trojan.BPlug.78
9.0.1.05190

Emsisoft Anti-Malware
Adware.Agent.OCH
8.14.06.27.02

ESET NOD32
Win32/BrowseFox.K potentially unwanted application
7.0.302.0

F-Prot
W32/MegaBrowse.A
4.6.5.141

F-Secure
Adware.Agent.OCH
11.2014-27-06_6

G Data
Adware.Agent.OCH
14.6.24

IKARUS anti.virus
AdWare.SwiftBrowse
t3scan.1.6.1.0

Kaspersky
not-a-virus:AdWare.Win32.Agent
14.0.0.3647

McAfee
Artemis!842EDB4C77B1
5600.7086

MicroWorld eScan
Adware.Agent.OCH
15.0.0.534

nProtect
Adware.Agent.OCH
14.06.16.01

Qihoo 360 Security
HEUR/Malware.QVM30.Gen
1.0.0.1015

Reason Heuristics
PUP.JumpFlip.g
14.8.8.0

Sophos
Generic PUA CG
4.98

Vba32 AntiVirus
AdWare.LinkSwift
3.12.26.0

VIPRE Antivirus
Threat.4150696
29418

Zillya! Antivirus
Adware.SwiftBrowse.Win32.7
2.0.0.1833

File size:
289.3 KB (296,224 bytes)

Product version:
2.1.0.2

Copyright:
TODO: (c) <Company name>. All rights reserved.

Original file name:
XTLS.dll

File type:
Dynamic link library (Win32 DLL)

Language:
English (United States)

Common path:
C:\Program Files\jump flip\bin\{cc30460f-753f-44d9-b58c-13dae1321968}.dll

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
8/22/2013 2:00:00 AM

Valid to:
8/23/2015 1:59:59 AM

Subject:
CN=Jump Flip, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Jump Flip, L=Santa Monica, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
144CF0B61216826C7F439B5C91A6ABD6

File PE Metadata
Compilation timestamp:
4/30/2014 1:20:28 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
3072:1MIwkOaVc3OotsrAEM2kVUFxXYNO0A/LKJeeJnXVL2TjXOCbq2xqoIfTean8S75i:1MIwk72laQGW/spGXV2GCbqZoIfhVHhK

Entry address:
0x21C37

Entry point:
8B, FF, 55, 8B, EC, 83, 7D, 0C, 01, 75, 05, E8, CB, 84, 00, 00, FF, 75, 08, 8B, 4D, 10, 8B, 55, 0C, E8, EC, FE, FF, FF, 59, 5D, C2, 0C, 00, B8, 57, AC, 02, 10, A3, 88, 23, 04, 10, C7, 05, 8C, 23, 04, 10, 4D, A3, 02, 10, C7, 05, 90, 23, 04, 10, 01, A3, 02, 10, C7, 05, 94, 23, 04, 10, 3A, A3, 02, 10, C7, 05, 98, 23, 04, 10, A3, A2, 02, 10, A3, 9C, 23, 04, 10, C7, 05, A0, 23, 04, 10, CF, AB, 02, 10, C7, 05, A4, 23, 04, 10, BF, A2, 02, 10, C7, 05, A8, 23, 04, 10, 21, A2, 02, 10, C7, 05, AC, 23, 04, 10, AD, A1...
 
[+]

Code size:
204 KB (208,896 bytes)

Remove {cc30460f-753f-44d9-b58c-13dae1321968}.dll - Powered by Reason Core Security