classic frumps joeblob.exe

Stepan Rybin

The is the installer for the WebPick InstalleRex download manager which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed without consent. The application classic frumps joeblob.exe by Stepan Rybin has been detected as adware by 26 anti-malware scanners. It uses Web-Pick's InstalleRex download manager and installer to bundle potentially unwanted ad-supported software which includes toolbars and browser extensions through a pay-per-install monetization scheme.
Publisher:
Stepan Rybin  (signed and verified)

MD5:
a910a20c633914b906ee1f5443ae8cd1

SHA-1:
4ae5921b6c8f0e9f9c8554d72b589146308bf924

SHA-256:
166d71487ec9b8ac06ec9e7a1d9c2269db200be7d9757e4f99e66bda3ffb467d

Scanner detections:
26 / 68

Status:
Adware

Explanation:
Uses the InstalleRex from WebPick Internet Holdings to install bundled add-ons including toolbars and other web browser extensions.

Analysis date:
4/16/2024 8:28:22 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Mplug.36
5651644

AhnLab V3 Security
PUP/Win32.MultiPlug
2015.04.19

Avira AntiVirus
TR/Crypt.XPACK.Gen
7.11.30.172

avast!
Win32:Adware-gen [Adw]
150414-0

AVG
Generic6
2016.0.3135

Bitdefender
Gen:Variant.Adware.Mplug.36
1.0.20.545

Comodo Security
Application.Win32.MultiPlug.YTRA
21818

Dr.Web
Trojan.Crossrider1.22656
9.0.1.05190

Emsisoft Anti-Malware
Gen:Variant.Adware.Mplug.36
9.0.0.4799

ESET NOD32
Win32/Adware.MultiPlug.IW application
7.0.302.0

Fortinet FortiGate
Riskware/MultiPlug
4/19/2015

F-Prot
W32/S-1808b583
v6.4.7.1.166

F-Secure
Gen:Variant.Adware.Mplug
5.13.68

G Data
Gen:Variant.Adware.Mplug.36
15.4.25

IKARUS anti.virus
PUA.Multiplug
t3scan.1.8.9.0

K7 AntiVirus
Unwanted-Program
13.202.15641

Kaspersky
not-a-virus:AdWare.Win32.MultiPlug
15.0.0.543

Malwarebytes
PUP.Optional.MultiPlug
v2015.04.19.06

McAfee
MultiPlug-FXR
5600.6791

Microsoft Security Essentials
SoftwareBundler:Win32/InstalleRex
1.1.11502.0

MicroWorld eScan
Gen:Variant.Adware.Mplug.36
16.0.0.327

NANO AntiVirus
Riskware.Win32.MultiPlug.dqmsmd
0.30.16.1110

Reason Heuristics
Threat.WebPick.StepanRybin
15.4.19.1

Sophos
PUA 'MultiPlug' (of type Adware)
5.13

Vba32 AntiVirus
suspected of Heur.Malware-Cryptor.Multiplug
3.12.26.3

Zillya! Antivirus
Adware.MultiPlug.Win32.270247
2.0.0.2143

File size:
367.2 KB (376,008 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\ProgramData\application data\{9d36c66a-e532-a820-9d36-6c66ae5319ab}\classic frumps joeblob.exe

Digital Signature
Signed by:

Authority:
Unizeto Technologies S.A.

Valid from:
6/27/2014 2:37:40 AM

Valid to:
6/27/2015 2:37:40 AM

Subject:
E=rybin.step@yandex.ru, CN=Stepan Rybin, O=Stepan Rybin, C=UA

Issuer:
CN=Certum Code Signing CA, OU=Certum Certification Authority, O=Unizeto Technologies S.A., C=PL

Serial number:
47154C2151E9EB8DFA42C2C9E45BFC6C

File PE Metadata
Compilation timestamp:
11/22/2012 11:44:27 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
6144:njgjyrLmV/Qao1BVStcI8Pvu1BuGnHjxbuccKvAClxUdYQWqJZWkzv16k1D/dH9:8YiV/QaDtr1njxbuccrCe/dH9

Entry address:
0x1EACB

Entry point:
E8, 54, 12, 00, 00, E9, 00, 00, 00, 00, 6A, 14, 68, 60, A2, 43, 00, E8, 5F, 17, 00, 00, E8, 21, 14, 00, 00, 0F, B7, F0, 6A, 02, E8, E7, 11, 00, 00, 59, B8, 4D, 5A, 00, 00, 66, 39, 05, 00, 00, 40, 00, 74, 04, 33, DB, EB, 33, A1, 3C, 00, 40, 00, 81, B8, 00, 00, 40, 00, 50, 45, 00, 00, 75, EB, B9, 0B, 01, 00, 00, 66, 39, 88, 18, 00, 40, 00, 75, DD, 33, DB, 83, B8, 74, 00, 40, 00, 0E, 76, 09, 39, 98, E8, 00, 40, 00, 0F, 95, C3, 89, 5D, E4, E8, C8, 0B, 00, 00, 85, C0, 75, 08, 6A, 1C, E8, DC, 00, 00, 00, 59, E8...
 
[+]

Entropy:
6.0640

Code size:
143 KB (146,432 bytes)

Remove classic frumps joeblob.exe - Powered by Reason Core Security