7.dll

particular software large

The module 7.dll has been detected as a potentially unwanted program by 22 anti-malware scanners. It is installed within the context of Internet Explore as a BHO (Browser Helper Object) under the name ‘FiNdBeustDeaale’. This file is typically installed with the program ApptoU by InstalleRex-WebPick which is a potentially unwanted software program.
Publisher:
particular software large

Product:
particular software large

Description:
fails to

Version:
the world system

MD5:
207f6a1c004413589fab5383301007cf

SHA-1:
76b2fe46965b4b56faaff24636b05461c359ba2e

SHA-256:
034acbc6bfe5d3ed5cec3a0b4649f9ce0c2ba841c37e2b5fae8f0ade0b271ce4

Scanner detections:
22 / 68

Status:
Potentially unwanted

Analysis date:
4/27/2024 12:09:15 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Generic.659286
856

Agnitum Outpost
PUA.MultiPlug
7.1.1

Avira AntiVirus
SPR/Tool.366592
7.11.164.142

avast!
Win32:Adware-gen [Adw]
2014.9-141002

AVG
Generic5
2015.0.3334

Baidu Antivirus
Adware.Win32.MultiPlug
4.0.3.14626

Bitdefender
Application.Generic.659286
1.0.20.1375

Comodo Security
ApplicUnwnt
19020

ESET NOD32
Win32/AdWare.MultiPlug (variant)
8.10174

Fortinet FortiGate
Riskware/MultiPlug
10/2/2014

F-Secure
Application.Generic.659286
11.2014-02-10_5

G Data
Application.Generic.659286
14.10.24

K7 AntiVirus
Adware
13.181.12872

Malwarebytes
PUP.Optional.MultiPlug
v2014.10.02.05

McAfee
RDN/Generic PUP.x!cgx
5600.6990

MicroWorld eScan
Application.Generic.659286
15.0.0.825

Panda Antivirus
Trj/CI.A
14.10.02.05

Rising Antivirus
PE:Trojan.Win32.Generic.16E5A118!384147736
23.00.65.14930

Sophos
Generic PUA HG
4.98

Trend Micro House Call
TROJ_GEN.R0CBC0OGL14
7.2.275

Trend Micro
TROJ_GEN.R0CBC0OGL14
10.465.02

VIPRE Antivirus
Trojan.Win32.Generic
31738

File size:
358 KB (366,592 bytes)

Product version:
particular software large

Copyright:
Copyright (C) 2014

Original file name:
fails to

File type:
Dynamic link library (Win32 DLL)

Language:
English (United States)

Common path:
C:\ProgramData\findbeustdeaale\7.dll

File PE Metadata
Compilation timestamp:
6/25/2014 9:05:57 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
6144:KQ6RvdbjbUwQueoO2HRFVfMxT9XoO92CA9WCY3w/9E11gv92:t6RvdNZ7jV2poO9ID9jF2

Entry address:
0x34241

Entry point:
55, 8B, EC, 83, 7D, 0C, 01, 75, 05, E8, 75, 60, 00, 00, FF, 75, 10, FF, 75, 0C, FF, 75, 08, E8, 07, 00, 00, 00, 83, C4, 0C, 5D, C2, 0C, 00, 6A, 0C, 68, 70, EF, 04, 10, E8, 40, 03, 00, 00, 33, C0, 40, 8B, 75, 0C, 85, F6, 75, 0C, 39, 35, 50, 71, 05, 10, 0F, 84, E4, 00, 00, 00, 83, 65, FC, 00, 83, FE, 01, 74, 05, 83, FE, 02, 75, 35, 8B, 0D, 18, 6C, 04, 10, 85, C9, 74, 0C, FF, 75, 10, 56, FF, 75, 08, FF, D1, 89, 45, E4, 85, C0, 0F, 84, B1, 00, 00, 00, FF, 75, 10, 56, FF, 75, 08, E8, 11, FE, FF, FF, 89, 45, E4...
 
[+]

Developed / compiled with:
Microsoft Visual C++

Code size:
258 KB (264,192 bytes)

Internet Explorer BHO
Display name:
FiNdBeustDeaale

CLSID:
{FC92FCA5-8708-99B9-9326-795939872975}


The file 7.dll has been discovered within the following program.

ApptoU  by InstalleRex-WebPick
AppToU is an adware program that will display extra advertisements when users are using search engines such as Bing and Google. In Chrome, it installs itself as an extension and in Internet Explorer it runs as a process as well as a Browser Helper Object.
83% remove it
 
Powered by Should I Remove It?

Remove 7.dll - Powered by Reason Core Security