utillinkswift.exe

linkswift

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application utillinkswift.exe by linkswift has been detected as adware by 8 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “Update LinkSwift”. This file is typically installed with the program Buzzdock by Alactro LLC which is a potentially unwanted software program. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
linkswift  (signed and verified)

Version:
1.0.5312.10399

MD5:
b18d1209c5694413415a7f8ce5195f72

SHA-1:
da5f952e0ae1af3434dd763df3d1498e51e058e1

SHA-256:
dfe0febd5f3a5a7c11b73ebbc26e35aa52826d9f2790bfcf8f9de1478931dd24

Scanner detections:
8 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/26/2024 5:42:15 PM UTC  (today)

Scan engine
Detection
Engine version

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.14722

ESET NOD32
Win32/BrowseFox.H potentially unwanted application
7.0.302.0

IKARUS anti.virus
AdWare.Win32.LinkSwift
t3scan.1.6.1.0

Kaspersky
not-a-virus:AdWare.Win32.LinkSwift
15.0.0.494

Malwarebytes
PUP.Optional.LinkSwift.A
v2014.07.22.05

Reason Heuristics
PUP.Service.linkswift.N
14.8.7.22

Sophos
Generic PUA NK
4.98

VIPRE Antivirus
Threat.4741131
31208

File size:
314.3 KB (321,824 bytes)

Product version:
1.0.5312.10399

Original file name:
LinkSwift.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\Program Files\linkswift\bin\utillinkswift.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
8/11/2013 7:00:00 PM

Valid to:
8/12/2015 6:59:59 PM

Subject:
CN=linkswift, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=linkswift, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
3AD03D814D9E16358271D2CA8A94AB42

File PE Metadata
Compilation timestamp:
7/18/2014 1:46:54 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
8.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
6144:XmnBn8kmXldqXXk2d5foyISH3WMs7JCq2MQe+WpbvzaD:XmnB1mLqXz6xsq2M7tzK

Entry address:
0x4E5AA

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 02, 00, 10, 00, 00, 00, 20, 00, 00, 80, 18, 00, 00, 00, D8, 02, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
6.0982

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
305.5 KB (312,832 bytes)

Service
Display name:
Update LinkSwift

Type:
Win32OwnProcess


The file utillinkswift.exe has been discovered within the following program.

Buzzdock  by Alactro LLC
This is a web browser extension that injects advertising. From the EULA: "Buzzdock is free to download and use. Buzzdock is supported by advertising, and users will see additional ads on websites where Buzzdock features operate.
www.buzzdock.com/faq-support
79% remove it
 
Powered by Should I Remove It?

Remove utillinkswift.exe - Powered by Reason Core Security