XTLS.dll

XVRNT

PacFunction

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The module XTLS.dll, “TODO: <File description>” by PacFunction has been detected as adware by 3 anti-malware scanners. This file is typically installed with the program PacFunction by Yontoo Technology, Inc. which is a potentially unwanted software program.
Publisher:
TODO: <Company name>  (signed by PacFunction)

Product:
XVRNT

Description:
TODO: <File description>

Version:
2.0.0.5

MD5:
b39d327ed2207d4d70b8b12fe056b301

SHA-1:
1e5ec9d22417b7680deb6adc85ff9f918613e44b

SHA-256:
c7f795ce2093157795cc7efdcdd66296e73ee2dca0d8e17419f79f445a337ac5

Scanner detections:
3 / 68

Status:
Adware

Explanation:
Belongs to the Sambreel/Yontoo progam that inserts various forms of advertising in the user's web browser, installed with minimal or no user consent.

Analysis date:
4/25/2024 6:55:31 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.PacFunction.E
14.3.22.7

Sophos
Lucky Leap
4.98

VIPRE Antivirus
Adware.Agent
27712

File size:
285.8 KB (292,640 bytes)

Product version:
2.0.0.5

Copyright:
TODO: (c) <Company name>. All rights reserved.

Original file name:
XTLS.dll

File type:
Dynamic link library (Win32 DLL)

Language:
English (United States)

Common path:
C:\Program Files\pacfunction\bin\xtls.dll

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/9/2014 3:00:00 AM

Valid to:
1/10/2015 2:59:59 AM

Subject:
CN=PacFunction, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=PacFunction, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
4DF47FADF68D2EB9B8A7923DCCC176FF

File PE Metadata
Compilation timestamp:
3/20/2014 11:36:19 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
6144:2iO/Hk7PRDYPC/Vsy6/KC2X3qbK7aeAzjgPqAiUc:5mHk7ZsC/CyaKC2X3qbK7aeAIqec

Entry address:
0x21227

Entry point:
8B, FF, 55, 8B, EC, 83, 7D, 0C, 01, 75, 05, E8, CB, 84, 00, 00, FF, 75, 08, 8B, 4D, 10, 8B, 55, 0C, E8, EC, FE, FF, FF, 59, 5D, C2, 0C, 00, B8, 47, A2, 02, 10, A3, 88, 23, 04, 10, C7, 05, 8C, 23, 04, 10, 3D, 99, 02, 10, C7, 05, 90, 23, 04, 10, F1, 98, 02, 10, C7, 05, 94, 23, 04, 10, 2A, 99, 02, 10, C7, 05, 98, 23, 04, 10, 93, 98, 02, 10, A3, 9C, 23, 04, 10, C7, 05, A0, 23, 04, 10, BF, A1, 02, 10, C7, 05, A4, 23, 04, 10, AF, 98, 02, 10, C7, 05, A8, 23, 04, 10, 11, 98, 02, 10, C7, 05, AC, 23, 04, 10, 9D, 97...
 
[+]

Entropy:
6.5100

Code size:
201.5 KB (206,336 bytes)

The file XTLS.dll has been discovered within the following program.

PacFunction  by Yontoo Technology, Inc.
TiltBorwser is a Yontoo/Sambreel advertising injection adware browser extension. - Random web page text is turned into hyperlinks. - Browser popups appear which recommend fake updates or other software.
pacfunction.info/support
87% remove it
 
Powered by Should I Remove It?

Remove XTLS.dll - Powered by Reason Core Security