tmp00000003773306471906b238

Desktop.Paladin

Web Cake

This file is part of the Web Cake web browser extension, an adware plugin for various web browsers designed to deliver context based advertising injected directly in the web pages a user is viewing as well opens advertisements that appear independently outside the context of the program, website, or other source the advertisements are promoting. While the file properties state the file is developed by 'Microsoft Corporation', this is not the case and it is designed just to look like a legitimate Microsoft system file. The file tmp00000003773306471906b238 by Web Cake has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. It is part of the Yontoo branded browser-extension.
Publisher:
Microsoft Corporation  (signed by Web Cake)

Product:
Desktop.Paladin

Version:
1.0.0.69

MD5:
2bdcd410ae983cdd913ae348cdff225a

SHA-1:
adf69cd71f88859ad80d3f15ef974ef7b73a2dba

SHA-256:
32796e796d99abf9748b9fb551dd6613a6dadc51ec9d08b46701e550f50732cb

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Belongs to the Sambreel/Yontoo progam that inserts various forms of advertising in the user's web browser, installed with minimal or no user consent.

Analysis date:
11/23/2024 3:30:01 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Yontoo (M)
16.10.7.16

File size:
512 KB (524,288 bytes)

Product version:
1.0.0.69

Copyright:
Copyright © Microsoft 2013

Original file name:
Desktop.Paladin.dll

Common path:
C:\windows\temp\tmp00000003773306471906b238

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
4/9/2013 3:00:00 AM

Valid to:
4/10/2015 2:59:59 AM

Subject:
CN=Web Cake, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Web Cake, L=Carlsbad, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
06B9035EE5A556582D9427CC2C8DD0BC

File PE Metadata
Compilation timestamp:
7/30/2013 4:55:17 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
8.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
6144:vryIqpPK4l+t3d1qf4Bes+w2BR+dLRaIqqEkOCRy1v4eiScMXfJ1rLzzrz5:vNqpiMUiR+LpqqEkDylimLrLjV

Entry address:
0x1A342

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
97 KB (99,328 bytes)

Remove tmp00000003773306471906b238 - Powered by Reason Core Security