utillookinglink.exe

lookinglink

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application utillookinglink.exe by lookinglink has been detected as adware by 6 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “Update lookinglink”. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
lookinglink  (signed and verified)

Version:
1.0.5316.21383

MD5:
7094aa5f87ff26133174fad7c19f62a7

SHA-1:
f5d1b501a36f3c949f9d7112bbb8b79cc8579c84

SHA-256:
33afd5a11528f6f522714b7d81cb605e8572255a42071c8c41390f4a6ca7e153

Scanner detections:
6 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/25/2024 4:11:38 PM UTC  (today)

Scan engine
Detection
Engine version

AVG
Lokilink
2015.0.3404

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.14724

ESET NOD32
Win32/BrowseFox.H potentially unwanted application
7.0.302.0

Malwarebytes
PUP.Optional.Lookinglink.A
v2014.07.24.02

Reason Heuristics
PUP.lookinglink.P
14.7.23.21

VIPRE Antivirus
Threat.4741131
31208

File size:
314.3 KB (321,824 bytes)

Product version:
1.0.5316.21383

Original file name:
lookinglink.exe

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\lookinglink\bin\utillookinglink.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
11/27/2013 8:00:00 AM

Valid to:
11/28/2014 7:59:59 AM

Subject:
CN=lookinglink, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=lookinglink, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
3196DD72CC98341089CB73C9BA4B6429

File PE Metadata
Compilation timestamp:
7/22/2014 8:53:02 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
8.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
6144:6PmiBn8yF0LjXqxkO8GvL7cjI0Ms7pfXLvW+capbMegpx:6PmiBnFWXqcrxhX5meM

Entry address:
0x4E5A2

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 02, 00, 10, 00, 00, 00, 20, 00, 00, 80, 18, 00, 00, 00, E0, 02, 00, 80, 00, 00...
 
[+]

Entropy:
6.0946

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
305.5 KB (312,832 bytes)

Service
Display name:
Update lookinglink

Type:
Win32OwnProcess


Remove utillookinglink.exe - Powered by Reason Core Security