greygray.browseradapter.dll

GreyGray

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The module greygray.browseradapter.dll by GreyGray has been detected as adware by 8 anti-malware scanners. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
GreyGray  (signed and verified)

Version:
1.0.5444.16979

MD5:
512d6a801ee33a9636f0f87eb05c8c1d

SHA-1:
ce03e5563a7d6859fa4763f33bc1538208cdeb75

SHA-256:
dca7ce23b8f801b5e7bd7d3902aced6c61c60491c65ef0b436eecc8e0270b774

Scanner detections:
8 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/24/2024 1:17:24 PM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
ADWARE/BrowseFox.Gen7
7.11.189.64

AVG
GreyGray
2015.0.3277

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.141128

K7 AntiVirus
Adware
13.186.14161

Qihoo 360 Security
Win32/Virus.Adware.708
1.0.0.1015

Reason Heuristics
Adware.Yontoo.GreyGray.W
14.11.28.1

Sophos
GreyGray
4.98

VIPRE Antivirus
Threat.4741131
35088

File size:
1 MB (1,087,256 bytes)

Product version:
1.0.5444.16979

Original file name:
GreyGray.BrowserAdapter2014112717.dll

File type:
Dynamic link library (Win32 DLL)

Common path:
C:\Program Files\greygray\bin\plugins\greygray.browseradapter.dll

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
9/19/2013 5:00:00 AM

Valid to:
9/20/2015 4:59:59 AM

Subject:
CN=GreyGray, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=GreyGray, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
23FF62A16C638B371A4AB98A8F876E8B

File PE Metadata
Compilation timestamp:
11/27/2014 10:26:03 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
6.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
24576:iWMEQe5QPa54ooIcWpDLjSi7zy7fQcKIwF3:iIr5uwo85L7zyrQcXW3

Entry address:
0x1094E2

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
1 MB (1,078,784 bytes)

Remove greygray.browseradapter.dll - Powered by Reason Core Security