Smartbar.Resources.HistoryAndStatsWrapper.dll

Smartbar.Resources.HistoryAndStatsWrapper

VERISTAFF.COM LTD

This is part of the Linkury/SnapDo monetization software, a web browser toolbar used to hijack a user's search in order to collect revenues. The SmartBar is a a potentially unwanted toolbar and Windows Gadget that is advertising supported (adware). The module Smartbar.Resources.HistoryAndStatsWrapper.dll by VERISTAFF.COM has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat.
Publisher:
VERISTAFF.COM LTD  (signed and verified)

Product:
Smartbar.Resources.HistoryAndStatsWrapper

Version:
1.2.0.0

MD5:
ed7239998e08c398d3677215dbda5c7b

SHA-1:
85ad553b7b91888e172ead923d3d2f2e801f5f56

SHA-256:
75e4a44d952ba6849d050b1fd2c14d861659463cfa980ddad54faf5ed5bad4b1

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
12/24/2024 5:33:27 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Smartbar.Resoft (M)
16.7.2.7

File size:
157 KB (160,784 bytes)

Product version:
1.2.0.0

Original file name:
Smartbar.Resources.HistoryAndStatsWrapper.dll

File type:
Dynamic link library (Win32 DLL)

Language:
Language Neutral

Common path:
C:\Program Files\lpt\smartbar.resources.historyandstatswrapper.dll

Digital Signature
Authority:
COMODO CA Limited

Valid from:
9/14/2014 9:00:00 PM

Valid to:
9/15/2015 8:59:59 PM

Subject:
CN=VERISTAFF.COM LTD, OU=514841295, O=VERISTAFF.COM LTD, STREET=Shenkar 14, L=Hertzlya, S=TLV, PostalCode=4672514, C=IL

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
2AF13BF1274B91869E8E8BA9B16282CA

File PE Metadata
Compilation timestamp:
10/30/2014 10:07:17 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
6.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
3072:jr1Fetg+j5m57Ql6s5Vr1xaSO9Q9w/y/29Vb:j+j5gEl6sr29XVb

Entry address:
0x26CA2

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
147.5 KB (151,040 bytes)