{ce2cc6b9-0133-4405-9775-8944501dc17c}.dll

XVRNT

kozaka

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The module {ce2cc6b9-0133-4405-9775-8944501dc17c}.dll, “TODO: <File description>” by kozaka has been detected as adware by 32 anti-malware scanners. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
TODO: <Company name>  (signed by kozaka)

Product:
XVRNT

Description:
TODO: <File description>

Version:
2.0.0.9

MD5:
216c08784232a093a7897247443433fb

SHA-1:
343e3989eddf8a5eef947ff36b1201e423f1b60f

SHA-256:
d4975bc234106a6fb9ea6e83fe53ecb942a0865e91bcd375f84697d8d307ff42

Scanner detections:
32 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/24/2024 12:31:35 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.SwiftBrowse.BR
369

Agnitum Outpost
PUA.Agent
7.1.1

AhnLab V3 Security
Adware/Win32.BHO
2015.06.24

Avira AntiVirus
ADWARE/BrowseFox.Gen
8.3.1.6

avast!
Win32:BrowseFox-C [PUP]
2014.9-160201

AVG
Generic
2017.0.2847

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.1621

Bitdefender
Adware.SwiftBrowse.BR
1.0.20.160

Bkav FE
W32.HfsAdware
1.3.0.6597

Clam AntiVirus
Win.Adware.Swiftbrowse-57
0.98/21511

Comodo Security
UnclassifiedMalware
22563

Dr.Web
Trojan.Yontoo.1810
9.0.1.032

Emsisoft Anti-Malware
Adware.SwiftBrowse.BR
8.16.02.01.09

ESET NOD32
Win32/BrowseFox.M potentially unwanted (variant)
10.11834

Fortinet FortiGate
Adware/Yotoon
2/1/2016

F-Prot
W32/S-4f6ae4fe
v6.4.7.1.166

F-Secure
Adware.SwiftBrowse.BR
11.2016-01-02_2

G Data
Adware.SwiftBrowse.BR
16.2.25

K7 AntiVirus
Trojan
13.205.16336

Kaspersky
not-a-virus:AdWare.Win32.Yotoon
14.0.0.728

McAfee
BrowseFox
5600.6503

MicroWorld eScan
Adware.SwiftBrowse.BR
17.0.0.96

NANO AntiVirus
Riskware.Win32.Yotoon.dcxhdu
0.30.24.2266

nProtect
Trojan-Clicker/W32.Yotoon.297240
15.06.24.01

Panda Antivirus
Trj/CI.A
16.02.01.09

Qihoo 360 Security
Trojan.Generic
1.0.0.1015

Quick Heal
Adware.Yotoon.A6
2.16.14.00

Reason Heuristics
PUP.Yontoo.kozaka (M)
16.2.1.9

Total Defense
Win32/Tnega.RJICXCB
37.1.62.1

Vba32 AntiVirus
AdWare.Agent
3.12.26.4

VIPRE Antivirus
Trojan.Win32.Generic
41406

Zillya! Antivirus
Adware.LinkSwift.Win32.43
2.0.0.2250

File size:
287.8 KB (294,680 bytes)

Product version:
2.0.0.9

Copyright:
TODO: (c) <Company name>. All rights reserved.

Original file name:
XTLS.dll

File type:
Dynamic link library (Win32 DLL)

Language:
English (United States)

Common path:
C:\Program Files\kozaka\bin\{ce2cc6b9-0133-4405-9775-8944501dc17c}.dll

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
10/7/2013 1:00:00 AM

Valid to:
10/8/2014 12:59:59 AM

Subject:
CN=kozaka, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=kozaka, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
1B38C0B5B092B91BC43EB30DCF78B962

File PE Metadata
Compilation timestamp:
4/4/2014 7:41:22 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
6144:gUgSPzWSUYZGHOHtxMIC2XgqJu6gblXKzk1Ga:ZJ7WSURHONOIC2XgqJu6gblXh1Ga

Entry address:
0x21887

Entry point:
8B, FF, 55, 8B, EC, 83, 7D, 0C, 01, 75, 05, E8, CB, 84, 00, 00, FF, 75, 08, 8B, 4D, 10, 8B, 55, 0C, E8, EC, FE, FF, FF, 59, 5D, C2, 0C, 00, B8, A7, A8, 02, 10, A3, 88, 23, 04, 10, C7, 05, 8C, 23, 04, 10, 9D, 9F, 02, 10, C7, 05, 90, 23, 04, 10, 51, 9F, 02, 10, C7, 05, 94, 23, 04, 10, 8A, 9F, 02, 10, C7, 05, 98, 23, 04, 10, F3, 9E, 02, 10, A3, 9C, 23, 04, 10, C7, 05, A0, 23, 04, 10, 1F, A8, 02, 10, C7, 05, A4, 23, 04, 10, 0F, 9F, 02, 10, C7, 05, A8, 23, 04, 10, 71, 9E, 02, 10, C7, 05, AC, 23, 04, 10, FD, 9D...
 
[+]

Code size:
203 KB (207,872 bytes)

Remove {ce2cc6b9-0133-4405-9775-8944501dc17c}.dll - Powered by Reason Core Security