Irrational Number Applications - 27% Detection Rate *

Did you just run into a download or a file on your computer that is digitally signed by Irrational Number Applications? Some of the security products refers to the detected files as Adware.Yontoo.79 and a variant of MSIL/Adware.PullUpdate.G.gen. The detection rate for the Irrational Number Applications files collected here is 27%. Please read on for more details.

You will typically see Irrational Number Applications when double-clicking to run the file. The publisher name is displayed as the "Verified publisher" in the UAC dialog as the screenshot shows:

Screenshot where Irrational Number Applications appears as the verified publisher in the UAC dialog

You can also view the Irrational Number Applications certificate with the following steps:

  1. Open up Windows Explorer and locate the Irrational Number Applications file
  2. Right-click on the file and select Properties
  3. Click the Digital Signatures tab
  4. Click the View Certificate button

Here's a screenshot of a file that has been digitally signed by Irrational Number Applications:

Screenshot of the Irrational Number Applications certificate

As you can see in the screenshot above, Windows reports that "This digital signature is OK". This means that the file has been published by Irrational Number Applications and that no one has tampered with the file.

If you click the View Certificate button shown in the screenshot above, you can examine all the details of the certificate, such as when it was issued, who issued the certificate, how long it is valid, etc. You can also view the address for Irrational Number Applications, such as the street name, city and country.

Symantec Class 3 SHA256 Code Signing CA has issued the Irrational Number Applications certificates. You can also examine the details of the issuer by clicking the View Certificate button shown in the screenshot above.

Irrational Number Applications Files

The following are the Irrational Number Applications files I have collected, thanks to the FreeFixer users.

Detection RatioFile Name
12/57WebShieldService.exe
27/57KHBqMkV.dll
17/57uvzvsyoakgj.exe
4/55jmxapru.exe
9/57ddhtlcov.exe
8/57LrLxqFLmnK.exe
8/57aNZukKNB.exe
13/57eabektjaevo.exe
14/57WebShield.exe
11/57emipbxp.exe
10/56WebShieldService.exe
9/57XXysKY.exe
25/57epvKUd.dll
7/57WebShieldService.exe
9/57WebShield.exe
17/57okvcwN.dll

Scanner and Detection Names

Here is the detection names for the Irrational Number Applications files. I have grouped the detection names by each scanner engine. Thanks to VirusTotal for the scan results.

ScannerDetection Names
ALYacAdware.PullUpdate.T
AVGDownloader.CBD, Downloader.DIQ, Downloader.BSH, Generic_r.YZ
AVwarePullUpdate
Ad-AwareAdware.PullUpdate.T
AgnitumPUA.PullUpdate!, PUA.Agent!
AhnLab-V3PUP/Win32.PullUpdate
Antiy-AVLTrojan/Win32.TSGeneric, GrayWare[AdWare:not-a-virus]/Win64.Agent
ArcabitAdware.PullUpdate.T
AviraADWARE/PullUpdate.Gen7, ADWARE/PullUpdate.Gen, ADWARE/Adware.Gen7
Baidu-InternationalAdware.Win32.PullUpdate.IrNu, Adware.MSIL.PullUpdate.K, Adware.MSIL.PullUpdate.G
BitDefenderAdware.PullUpdate.T
BkavW32.HfsAdware.3AEF, W64.HfsAdware.3AEF
CyrenW32/PullUpdate.B.gen!Eldorado, W64/S-18e2fd5b!Eldorado
DrWebAdware.Yontoo.79
ESET-NOD32a variant of MSIL/Adware.PullUpdate.G.gen, a variant of MSIL/Adware.PullUpdate.K.gen
EmsisoftAdware.PullUpdate.T (B)
F-ProtW32/PullUpdate.B.gen!Eldorado, W64/S-18e2fd5b!Eldorado
F-SecureAdware.PullUpdate.T
FortinetAdware/PullUpdate
GDataAdware.PullUpdate.T
IkarusPUA.Downloader, AdWare.PullUpdate
JiangminAdWare/MSIL.joc, AdWare/SaMon.bh, Adware/Agent.annd
K7AntiVirusAdware ( 004b06651 ), Adware ( 004b8ebe1 )
K7GWAdware ( 004b06651 ), Adware ( 004b8ebe1 ), Hacktool ( 655367771 )
Kasperskynot-a-virus:AdWare.Win64.Agent.y
MalwarebytesPUP.Optional.WebShield.A, PUP.Optional.ZombieInvasion.A, PUP.Optional.WebShield, PUP.Optional.PullUpdate.C
McAfeeArtemis!0404802ED919, Artemis!81926423AAED
McAfee-GW-EditionArtemis
MicroWorld-eScanAdware.PullUpdate.T
NANO-AntivirusRiskware.Win32.SaMon.dniyss, Trojan.Win64.Downware.dhdcgg
PandaPUP/WebShield, Trj/CI.A
Qihoo-360HEUR/QVM30.1.Malware.Gen, HEUR/QVM03.0.Malware.Gen
RisingPE:Malware.RDM.32!5.26[F1]
SUPERAntiSpywareAdware.MSIL/Variant
SophosGeneric PUA OF
TencentMsil.Adware.Pullupdate.Swak, Trojan.Win32.Qudamah.Gen.29, Trojan.Win32.Qudamah.Gen.18, Msil.Adware.Pullupdate.Gbw, Msil.Adware.Pullupdate.Bno, Msil.Adware.Pullupdate.Llrd, Msil.Adware.Pullupdate.Ajkz, Msil.Adware.Pullupdate.Tcvw, Msil.Adware.Pullupdate.Szvk, Msil.Adware.Pullupdate.Lpbc
TrendMicro-HouseCallTROJ_GEN.R0C1H09ER15, Suspicious_GEN.F47V0518
VBA32AdWare.Agent
VIPREPullUpdate
ZillyaAdware.Agent.Win64.49
nProtectAdware.PullUpdate.T

* How the Detection Percentage is Calculated

The detection percentage is based on the fact that I've gathered 2312 scan results for the Irrational Number Applications files. 621 of these scan results came up with some sort of detection. You can review the full details of the scan reports by examining the files listed above.

Analysis Details

The analysis is based on certificates with the following serial numbers:

Comments

No comments posted yet.

Leave a reply