utilwebwaltz.exe

web waltz

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application utilwebwaltz.exe by web waltz has been detected as adware by 9 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “Util web waltz”. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
web waltz  (signed and verified)

Version:
1.0.5586.28469

MD5:
18deafbcf6e4bc2a40eb3d2cd038be55

SHA-1:
409dbcaeb306e80a13dd1be619bd497313414a64

SHA-256:
957291ed552e53af04b3bd0b1f8941c44419cb0bb354d38988e7aba31872ee41

Scanner detections:
9 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/18/2024 2:27:02 AM UTC  (today)

Scan engine
Detection
Engine version

AVG
Generic
2016.0.3135

Baidu Antivirus
Adware.MSIL.BrowseFox
4.0.3.15419

Bkav FE
W32.HfsAdware
1.3.0.6379

Dr.Web
Trojan.Yontoo.1734
9.0.1.05190

ESET NOD32
MSIL/BrowseFox.G potentially unwanted application
7.0.302.0

F-Prot
W32/S-e8c6878a
v6.4.7.1.166

K7 AntiVirus
Adware
13.202.15641

NANO AntiVirus
Riskware.Win32.BPlug.djpkri
0.30.16.1110

Reason Heuristics
Threat.Yontoo.webwaltz
15.4.19.3

File size:
405.3 KB (415,008 bytes)

Product version:
1.0.5586.28469

Original file name:
webwaltz2015041823.exe

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\web waltz\bin\utilwebwaltz.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
9/19/2013 2:00:00 AM

Valid to:
9/20/2015 1:59:59 AM

Subject:
CN=web waltz, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=web waltz, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
5FD8087829E831DA83F74489B52D1DFF

File PE Metadata
Compilation timestamp:
4/19/2015 1:49:13 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
6.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
6144:f5SjwPqA7HCVP9r195Il/AoThBirWXSNfFd66ZsZy4v1r/MZTQBqfihE20VKX10l:xBs195Il/XThBiKXq6ksDvK6C2r0l

Entry address:
0x65066

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
396.5 KB (406,016 bytes)

Service
Display name:
Util web waltz

Type:
Win32OwnProcess


Remove utilwebwaltz.exe - Powered by Reason Core Security