Smartbar.Personalization.BusinessEntities.dll

Smartbar.Personalization.BusinessEntities

Linkury

This is part of the Linkury monetization software, a web browser toolbar used to 'hijack' a user's search in order to collect revenues. The Linkury SmartBar is a a potentially unwanted toolbar and Windows Gadget that is advertising supported. The module Smartbar.Personalization.BusinessEntities.dll by Linkury has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat.
Publisher:
Microsoft  (signed by Linkury)

Product:
Smartbar.Personalization.BusinessEntities

Version:
1.2.0.0

MD5:
680063a4bb6ad76d30ae5b5641a6a175

SHA-1:
400ebcc43f4fda6b22b53e8fe9ebee97222e9875

SHA-256:
9eabc8b88cb9389d5e2bdcb5ecc1d7d50fd79f8aafcdcd42dec44790ec61e97f

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
12/23/2024 6:51:19 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Smartbar (M)
17.2.11.12

File size:
98.3 KB (100,632 bytes)

Product version:
1.2.0.0

Original file name:
Smartbar.Personalization.BusinessEntities.dll

File type:
Dynamic link library (Win32 DLL)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\smartbar\application\smartbar.personalization.businessentities.dll

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
4/12/2012 2:00:00 AM

Valid to:
5/12/2015 1:59:59 AM

Subject:
CN=Linkury, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Linkury, L=Ramat Gan, S=Israel, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
77A9B89A06B99100955A838E8BB46FF8

File PE Metadata
Compilation timestamp:
6/27/2013 2:02:16 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
11.0

.NET CLR dependent:
Yes

Entry address:
0x1850E

Entry point:
FF, 25, 00, 20, 00, 10, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
89.5 KB (91,648 bytes)