followrulesbho.dll

Follow Rules

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The module followrulesbho.dll by Follow Rules has been detected as adware by 38 anti-malware scanners. It is installed within the context of Internet Explore as a BHO (Browser Helper Object) under the name ‘Follow Rules 1.0.0.7’. This file is typically installed with the program Follow Rules by Yontoo Technology, Inc. which is a potentially unwanted software program. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
Follow Rules  (signed and verified)

Product:
Follow Rules

Version:
1.0.0.7

MD5:
3f5942081c8e244d76a0ed4e783ed1ca

SHA-1:
14ef7001624968b3bb9f441900ba969049327f30

SHA-256:
fe11e5b1828bcd73f60f9ff2e6425ae7e756761f6858f4e99a2c97a783a3283c

Scanner detections:
38 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
5/5/2024 6:10:53 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.BrowseFox.BJ
712

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
Adware/Win32.BrowseFox
2015.01.27

Avira AntiVirus
ADWARE/BrowseFox.Gen2
7.11.212.6

avast!
Win32:BrowseFox-DZ [PUP]
2014.9-150222

AVG
Generic
2016.0.3190

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.15222

Bitdefender
Adware.BrowseFox.BJ
1.0.20.265

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Browsefox-411
0.98/21511

Comodo Security
Application.Win32.BrowseFox.JM
20860

Dr.Web
Trojan.Yontoo.1016
9.0.1.053

Emsisoft Anti-Malware
Adware.BrowseFox.BJ
8.15.02.22.03

ESET NOD32
Win32/BrowseFox.AE potentially unwanted (variant)
9.11214

Fortinet FortiGate
Riskware/BrowseFox
2/22/2015

F-Prot
W32/S-f64f6ec1
v6.4.7.1.166

F-Secure
Adware.BrowseFox.BJ
11.2015-22-02_1

G Data
Adware.BrowseFox.BJ
15.2.25

IKARUS anti.virus
AdWare.BrowseFox
t3scan.1.8.6.0

K7 AntiVirus
Unwanted-Program
13.197.15043

Kaspersky
not-a-virus:AdWare.Win32.Agent
14.0.0.2447

Malwarebytes
PUP.Optional.FollowRules.A
v2015.02.22.03

McAfee
Artemis!3F5942081C8E
5600.6846

MicroWorld eScan
Adware.BrowseFox.BJ
16.0.0.159

NANO AntiVirus
Trojan.Win32.Yontoo.dnkubo
0.30.0.296

Norman
Gen:Variant.Adware.BetterBrowse.1
11.20150222

nProtect
Adware.BrowseFox.BJ
15.01.26.01

Panda Antivirus
Trj/CI.A
15.02.22.03

Qihoo 360 Security
HEUR/QVM30.1.Malware.Gen
1.0.0.1015

Reason Heuristics
PUP.BHO.Yontoo
15.2.22.15

Rising Antivirus
PE:Trojan.Win32.Generic.17D5649F!399860895
23.00.65.15220

Sophos
Generic PUA EG
4.98

SUPERAntiSpyware
Adware.BrowseFox/Variant
10038

Trend Micro House Call
Suspicious_GEN.F47V0222
7.2.53

Trend Micro
TROJ_GEN.F0C2C00LH14
10.465.22

Vba32 AntiVirus
AdWare.Kranet
3.12.26.3

VIPRE Antivirus
Yontoo
37004

Zillya! Antivirus
Backdoor.PePatch.Win32.58304
2.0.0.2033

File size:
262.7 KB (269,040 bytes)

Product version:
1.0.0.7

Copyright:
(c) Follow Rules. All rights reserved.

File type:
Dynamic link library (Win32 DLL)

Language:
English (United States)

Common path:
C:\Program Files\follow rules\followrulesbho.dll

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/10/2015 4:00:00 PM

Valid to:
1/11/2016 3:59:59 PM

Subject:
CN=Follow Rules, O=Follow Rules, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
360C16AC576B09F5DFA927EA0089856F

File PE Metadata
Compilation timestamp:
2/21/2015 3:31:40 PM

OS version:
6.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
3072:2miYckCqEbUViVqUsVNXBB+/DFK3wY+K19ZKTKh2fBcE/:2miYckOiiVMrXBdD9ZtEm8

Entry address:
0xF515

Entry point:
55, 8B, EC, 83, 7D, 0C, 01, 75, 05, E8, EA, 7E, 00, 00, FF, 75, 10, FF, 75, 0C, FF, 75, 08, E8, 07, 00, 00, 00, 83, C4, 0C, 5D, C2, 0C, 00, 6A, 0C, 68, D8, 21, 03, 10, E8, 4C, 02, 00, 00, 33, C0, 40, 8B, 75, 0C, 85, F6, 75, 0C, 39, 35, 4C, 77, 03, 10, 0F, 84, E4, 00, 00, 00, 83, 65, FC, 00, 83, FE, 01, 74, 05, 83, FE, 02, 75, 35, 8B, 0D, C4, 93, 02, 10, 85, C9, 74, 0C, FF, 75, 10, 56, FF, 75, 08, FF, D1, 89, 45, E4, 85, C0, 0F, 84, B1, 00, 00, 00, FF, 75, 10, 56, FF, 75, 08, E8, 11, FE, FF, FF, 89, 45, E4...
 
[+]

Entropy:
6.0739

Developed / compiled with:
Microsoft Visual C++

Code size:
159 KB (162,816 bytes)

Internet Explorer BHO
Display name:
Follow Rules 1.0.0.7

CLSID:
{f6d23555-8478-48e6-a7ff-03a2762bfee4}


The file followrulesbho.dll has been discovered within the following programs.

Buzzdock  by Alactro LLC
This is a web browser extension that injects advertising. From the EULA: "Buzzdock is free to download and use. Buzzdock is supported by advertising, and users will see additional ads on websites where Buzzdock features operate.
www.buzzdock.com/faq-support
79% remove it
Follow Rules  by Yontoo Technology, Inc.
Once this adware is installed the application integrates inside the browser through multiple means and will deliver ads including but not limited to banner ads, text-links, coupons and other offers both by injecting them in the user's web browser as well as displaying popups outside of the browser.
followrulessoftware.com/support
80% remove it
 
Powered by Should I Remove It?

The file followrulesbho.dll has been seen being distributed by the following 3 URLs.

http://install-cdn.followrulessoftware.com/bed?r=2015022222&bet=3

Remove followrulesbho.dll - Powered by Reason Core Security