c80c3d7c31.dll

Primary Color

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The module c80c3d7c31.dll by Primary Color has been detected as adware by 32 anti-malware scanners. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
Primary Color  (signed and verified)

MD5:
f643f1e1cfa0e992c8b3de07f2c3ad61

SHA-1:
d832b81f5f645221b49786b770853dc1165c9fb3

SHA-256:
19fd464a45b1b27376c98e961f3f22f0724dd3236260c7a6e127bd1e2e3afeca

Scanner detections:
32 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/25/2024 9:39:03 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Graftor.201006
484

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
PUP/Win32.BrowseFox
2015.10.08

Avira AntiVirus
ADWARE/BrowseFox.Gen7
8.3.2.2

Arcabit
Trojan.Adware.Graftor.D3112E
1.0.0.576

AVG
AdPlugin
2016.0.2962

Bitdefender
Gen:Variant.Adware.Graftor.201006
1.0.20.1410

Bkav FE
W32.HfsAdware
1.3.0.7237

Clam AntiVirus
Win.Adware.Browsefox-220
0.98/21511

Comodo Security
Application.Win32.AltBrowse.OABP
23374

Dr.Web
Trojan.Yontoo.1837
9.0.1.0282

Emsisoft Anti-Malware
Gen:Variant.Adware.Graftor.201006
8.15.10.09.09

ESET NOD32
Win32/BrowseFox.CB potentially unwanted (variant)
9.12373

Fortinet FortiGate
Riskware/BrowseFox
10/9/2015

F-Prot
W32/S-4148226b
v6.4.7.1.166

F-Secure
Gen:Variant.Adware.Graftor
11.2015-09-10_6

G Data
Gen:Variant.Adware.Graftor.201006
15.10.25

K7 AntiVirus
Trojan
13.210.17460

Malwarebytes
PUP.Optional.PrimaryColor
v2015.10.09.09

McAfee
BrowseFox-FWV
5600.6618

MicroWorld eScan
Gen:Variant.Adware.Graftor.201006
16.0.0.846

NANO AntiVirus
Trojan.Win32.BPlug.dmjozr
0.30.26.3947

Panda Antivirus
PUP/BrowseFox
15.10.09.09

Quick Heal
PUA.SwiftBrowse.01314
10.15.14.00

Reason Heuristics
PUP.Yontoo.PrimaryColor (M)
15.10.9.9

Rising Antivirus
PE:Adware.BrowserFox!1.A127[F1]
23.00.65.151007

Sophos
Generic PUA NI (PUA)
4.98

SUPERAntiSpyware
Adware.BrowseFox/Variant
9580

Trend Micro
TROJ_GEN.R00XC0PJ715
10.465.09

Vba32 AntiVirus
AdWare.Win64.Kranet
3.12.26.4

VIPRE Antivirus
Trojan.Win32.Generic
44366

Zillya! Antivirus
Adware.Agent.Win32.38120
2.0.0.2434

File size:
192.7 KB (197,368 bytes)

File type:
Dynamic link library (Win32 DLL)

Common path:
C:\Program Files\primary color\bin\c80c3d7c31.dll

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/15/2015 1:00:00 AM

Valid to:
1/16/2016 12:59:59 AM

Subject:
CN=Primary Color, O=Primary Color, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
25DC34062844409A5E421392BA5A17B2

File PE Metadata
Compilation timestamp:
1/11/2015 12:50:50 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
3072:LNbpOnPsGqQTruHLD7RcQxKrrdNU0VAtrOpOOWxOv4Kn7qbjx7T/HrmY+:LNbqaLD7RcukVAtSQOWcgWqbV77LmH

Entry address:
0x115D2

Entry point:
8B, FF, 55, 8B, EC, 83, 7D, 0C, 01, 75, 05, E8, 0C, 91, 00, 00, FF, 75, 08, 8B, 4D, 10, 8B, 55, 0C, E8, EC, FE, FF, FF, 59, 5D, C2, 0C, 00, 8B, FF, 55, 8B, EC, 83, EC, 20, 8B, 45, 08, 56, 57, 6A, 08, 59, BE, 9C, 53, 02, 10, 8D, 7D, E0, F3, A5, 89, 45, F8, 8B, 45, 0C, 5F, 89, 45, FC, 5E, 85, C0, 74, 0C, F6, 00, 08, 74, 07, C7, 45, F4, 00, 40, 99, 01, 8D, 45, F4, 50, FF, 75, F0, FF, 75, E4, FF, 75, E0, FF, 15, 34, 50, 02, 10, C9, C2, 08, 00, 8B, FF, 55, 8B, EC, 51, 53, 8B, 45, 0C, 83, C0, 0C, 89, 45, FC, 64...
 
[+]

Code size:
143.5 KB (146,944 bytes)

Remove c80c3d7c31.dll - Powered by Reason Core Security