jc7a_d.dll

The module jc7a_d.dll has been detected as a potentially unwanted program by 41 anti-malware scanners. It is installed within the context of Internet Explore as a BHO (Browser Helper Object) under the name ‘LLuCKyCooupon’. The library is built using the Crossrider cross-browser extension platform. While the file utilizes the Crossrider framework and delivery services, it is not owned by Crossrider.
MD5:
29ec624c95a54cd77cfa10ab4b76d9fa

SHA-1:
478a2c7696301a359215d59f730aa7983fd9eb8d

SHA-256:
cba6abb0057f1835199c0a430048b708bc764e50d0ce6f6e6c9db8fe7af61ae4

Scanner detections:
41 / 68

Status:
Potentially unwanted

Explanation:
The file is infected by a polymorphic file infector virus.

Analysis date:
4/27/2024 3:04:53 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Win32.Ramnit.N
927

Agnitum Outpost
Win32.Nimnul.Gen.2
7.1.1

AhnLab V3 Security
Win32/Ramnit.G
14.07.22

Avira AntiVirus
W32/Ramnit.C
7.11.142.34

avast!
Win32:RmnDrp
2014.9-140722

AVG
Adware Generic_r.GU
2014.0.3986

Baidu Antivirus
Virus.Win32.Nimnul.$a
4.0.3.14722

Bitdefender
Win32.Ramnit.N
1.0.20.1015

Bkav FE
W32.InjectAdwaredDwnA1.PE
1.3.0.4959

Clam AntiVirus
W32.Ramnit-1
0.98/18355

Comodo Security
Virus.Win32.Ramnit.K
18072

Dr.Web
Trojan.Crossrider.2200
9.0.1.0203

Emsisoft Anti-Malware
Win32.Ramnit.N
8.14.07.22.06

ESET NOD32
Win32/AdWare.MultiPlug.N application
7.0.302.0

Fortinet FortiGate
W32/Ramnit.C
7/22/2014

F-Prot
W32/Ramnit.E
v6.4.7.1.166

F-Secure
Win32.Ramnit.N
11.2014-22-07_3

G Data
Win32.Ramnit
14.7.24

IKARUS anti.virus
AdWare.MegaSearch
t3scan.1.6.1.0

K7 AntiVirus
Virus
13.176.11696

Kaspersky
Virus.Win32.Nimnul
14.0.0.3521

Malwarebytes
PUP.Optional.MultiPlug.A
v2014.07.22.06

McAfee
W32/Ramnit.a
5600.7061

Microsoft Security Essentials
Virus:Win32/Ramnit.J
1.10401

MicroWorld eScan
Win32.Ramnit.N
15.0.0.609

NANO AntiVirus
Virus.Win32.Nimnul.bqjjnb
0.28.0.59048

Norman
Ramnit.AS
11.20140722

nProtect
Virus/W32.SpyEye
14.04.08.01

Panda Antivirus
W32/Cosmu.E
14.07.22.06

Qihoo 360 Security
Virus.Win32.Ramnit.A
1.0.0.1015

Quick Heal
W32.Ramnit.A
7.14.12.00

Reason Heuristics
Threat.Win.Reputation.IMP
14.7.22.18

Rising Antivirus
PE:Win32.Mgr.b!1594784
23.00.65.14720

Sophos
W32/Ramnit-A
4.98

SUPERAntiSpyware
Adware.Multiplug/Variant
10467

Total Defense
Win32/Ramnit.C
37.0.10866

Trend Micro House Call
PE_RAMNIT.DEN
7.2.203

Trend Micro
PE_RAMNIT.DEN
10.465.22

Vba32 AntiVirus
Virus.Win32.Nimnul.b
3.12.26.0

VIPRE Antivirus
Virus.Win32.Ramnit.b
28148

ViRobot
Win32.Nimnul.A
2011.4.7.4223

File size:
416.5 KB (426,496 bytes)

File type:
Dynamic link library (Win32 DLL)

Language:
English (United States)

Common path:
C:\ProgramData\lluckycooupon\jc7a_d.dll

File PE Metadata
Compilation timestamp:
1/26/2014 6:52:10 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
6144:ElpWBSQjNZKzlI/bKM03piqP/jgMg3TvHQiKpbYjX:ElpWBPZKBlJ3pTPbgMwvH+ZYjX

Entry address:
0x34121

Entry point:
55, 8B, EC, 83, 7D, 0C, 01, 75, 05, E8, 61, 52, 00, 00, FF, 75, 10, FF, 75, 0C, FF, 75, 08, E8, 07, 00, 00, 00, 83, C4, 0C, 5D, C2, 0C, 00, 6A, 0C, 68, 78, 2D, 05, 10, E8, 70, 0D, 00, 00, 33, C0, 40, 8B, 75, 0C, 85, F6, 75, 0C, 39, 35, 8C, AF, 05, 10, 0F, 84, E4, 00, 00, 00, 83, 65, FC, 00, 83, FE, 01, 74, 05, 83, FE, 02, 75, 35, 8B, 0D, A8, B3, 04, 10, 85, C9, 74, 0C, FF, 75, 10, 56, FF, 75, 08, FF, D1, 89, 45, E4, 85, C0, 0F, 84, B1, 00, 00, 00, FF, 75, 10, 56, FF, 75, 08, E8, 11, FE, FF, FF, 89, 45, E4...
 
[+]

Entropy:
5.8753

Developed / compiled with:
Microsoft Visual C++

Code size:
263 KB (269,312 bytes)

Internet Explorer BHO
Display name:
LLuCKyCooupon

CLSID:
{180457B6-B861-508A-52A0-8515A1766922}


Remove jc7a_d.dll - Powered by Reason Core Security