jotzey.purbrowse.exe.pendingoverwrite

Jotzey

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The file jotzey.purbrowse.exe.pendingoverwrite by Jotzey has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat.
Publisher:
Jotzey  (signed and verified)

MD5:
3a3c4c83c3447c95c392a6d5ca131086

SHA-1:
e6daefc7613fca31076c0c414d8adf4f7578770d

SHA-256:
44a397457353be25b2f7b5edb9cdb4aa5cf06f707c1cbea01dc33f8c774e76e7

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Belongs to the Sambreel/Yontoo progam that inserts various forms of advertising in the user's web browser, installed with minimal or no user consent.

Analysis date:
4/26/2024 12:37:55 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Yontoo (M)
17.3.12.7

File size:
287.3 KB (294,168 bytes)

Common path:
C:\Program Files\jotzey\bin\jotzey.purbrowse.exe.pendingoverwrite

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/12/2014 1:00:00 AM

Valid to:
1/13/2015 12:59:59 AM

Subject:
CN=Jotzey, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Jotzey, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
4C7B335D1F24250859B4B5C0085A062C

File PE Metadata
Compilation timestamp:
9/9/2014 11:54:02 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
10.0

Entry address:
0x20DEE

Entry point:
E8, 45, 84, 00, 00, E9, 95, FE, FF, FF, 8B, FF, 55, 8B, EC, 8B, 45, 08, 33, C9, 3B, 04, CD, 88, 34, 44, 00, 74, 13, 41, 83, F9, 2D, 72, F1, 8D, 48, ED, 83, F9, 11, 77, 0E, 6A, 0D, 58, 5D, C3, 8B, 04, CD, 8C, 34, 44, 00, 5D, C3, 05, 44, FF, FF, FF, 6A, 0E, 59, 3B, C8, 1B, C0, 23, C1, 83, C0, 08, 5D, C3, E8, F4, 51, 00, 00, 85, C0, 75, 06, B8, F0, 35, 44, 00, C3, 83, C0, 08, C3, E8, E1, 51, 00, 00, 85, C0, 75, 06, B8, F4, 35, 44, 00, C3, 83, C0, 0C, C3, 8B, FF, 55, 8B, EC, 56, E8, E2, FF, FF, FF, 8B, 4D, 08...
 
[+]

Code size:
209 KB (214,016 bytes)

Remove jotzey.purbrowse.exe.pendingoverwrite - Powered by Reason Core Security