followrules.dll

Follow Rules

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The module followrules.dll by Follow Rules has been detected as adware by 19 anti-malware scanners. Additionally, the file is typically installed by a number of programs including Follow Rules by Yontoo Technology, Inc. and Buzzdock by Alactro LLC, both potentially unwanted software. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
Follow Rules  (signed and verified)

Product:
Follow Rules

Version:
1.0.0.7

MD5:
ec994ca38a3bb994001924d83cdb4bef

SHA-1:
50d3b43a16e789b9ea05a63382ec288002ce4089

SHA-256:
9b2d587b5a2da70c1b08dd318122046843f918fd9ad428f36c11a401847fb014

Scanner detections:
19 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
12/26/2024 5:03:43 PM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
ADWARE/BrowseFox.Gen2
7.11.212.90

AVG
Generic
2016.0.3164

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.15320

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Browsefox-411
0.98/21511

Dr.Web
Trojan.Yontoo.1016
9.0.1.079

ESET NOD32
Win32/BrowseFox.AE potentially unwanted (variant)
9.11226

Fortinet FortiGate
Riskware/BrowseFox
3/20/2015

F-Prot
W32/S-f64f6ec1
v6.4.7.1.166

herdProtect (fuzzy)
2015.6.26.16

IKARUS anti.virus
AdWare.BrowseFox
t3scan.1.8.6.0

K7 AntiVirus
Unwanted-Program
13.198.15068

Malwarebytes
PUP.Optional.FollowRules.A
v2015.03.20.08

NANO AntiVirus
Trojan.Win32.Yontoo.dnkubo
0.30.0.296

Qihoo 360 Security
HEUR/QVM30.1.Malware.Gen
1.0.0.1015

Reason Heuristics
PUP.Yontoo
15.3.20.20

Trend Micro House Call
Suspicious_GEN.F47V0216
7.2.79

Vba32 AntiVirus
AdWare.MSIL.Agent
3.12.26.3

VIPRE Antivirus
Trojan.Win32.Generic
37862

File size:
262.7 KB (269,040 bytes)

Product version:
1.0.0.7

Copyright:
(c) Follow Rules. All rights reserved.

File type:
Dynamic link library (Win32 DLL)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\microsoft\windows\inetcache\content.ie5\c853n5w0\followrules.dll

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/11/2015 12:00:00 AM

Valid to:
1/11/2016 11:59:59 PM

Subject:
CN=Follow Rules, O=Follow Rules, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
360C16AC576B09F5DFA927EA0089856F

File PE Metadata
Compilation timestamp:
2/15/2015 5:27:46 PM

OS version:
6.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
3072:YmiYckCqEbUViVqUsVNXBB+/DFK3wY+K19ZKT+h2fccEv:YmiYckOiiVMrXBdD9Z9EjA

Entry address:
0xF515

Entry point:
55, 8B, EC, 83, 7D, 0C, 01, 75, 05, E8, EA, 7E, 00, 00, FF, 75, 10, FF, 75, 0C, FF, 75, 08, E8, 07, 00, 00, 00, 83, C4, 0C, 5D, C2, 0C, 00, 6A, 0C, 68, D8, 21, 03, 10, E8, 4C, 02, 00, 00, 33, C0, 40, 8B, 75, 0C, 85, F6, 75, 0C, 39, 35, 4C, 77, 03, 10, 0F, 84, E4, 00, 00, 00, 83, 65, FC, 00, 83, FE, 01, 74, 05, 83, FE, 02, 75, 35, 8B, 0D, C4, 93, 02, 10, 85, C9, 74, 0C, FF, 75, 10, 56, FF, 75, 08, FF, D1, 89, 45, E4, 85, C0, 0F, 84, B1, 00, 00, 00, FF, 75, 10, 56, FF, 75, 08, E8, 11, FE, FF, FF, 89, 45, E4...
 
[+]

Entropy:
6.0741

Developed / compiled with:
Microsoft Visual C++

Code size:
159 KB (162,816 bytes)

The file followrules.dll has been discovered within the following programs.

Buzzdock  by Alactro LLC
This is a web browser extension that injects advertising. From the EULA: "Buzzdock is free to download and use. Buzzdock is supported by advertising, and users will see additional ads on websites where Buzzdock features operate.
www.buzzdock.com/faq-support
79% remove it
Follow Rules  by Yontoo Technology, Inc.
Once this adware is installed the application integrates inside the browser through multiple means and will deliver ads including but not limited to banner ads, text-links, coupons and other offers both by injecting them in the user's web browser as well as displaying popups outside of the browser.
followrulessoftware.com/support
80% remove it
 
Powered by Should I Remove It?

The file followrules.dll has been seen being distributed by the following 2 URLs.

Remove followrules.dll - Powered by Reason Core Security