Linkury.Personalization.ServicesPlugins.NotepadPlugin.dll

NotepadPlugin

Linkury

This is part of the Linkury monetization software, a web browser toolbar used to 'hijack' a user's search in order to collect revenues. The module Linkury.Personalization.ServicesPlugins.NotepadPlugin.dll by Linkury has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat.
Publisher:
Microsoft  (signed by Linkury)

Product:
NotepadPlugin

Version:
1.2.0.0

MD5:
23d84147ba3b1899df066d49d205a71e

SHA-1:
7bfe117fc160f1c29ece7206cd7a0a603d8ba9a4

SHA-256:
a5c087ba83ef539a8c6793e6575da5b95343148f4c9f728af4636185c2b0a20c

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
4/19/2024 10:24:59 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Linkury (M)
16.2.9.6

File size:
11.8 KB (12,088 bytes)

Product version:
1.2.0.0

Copyright:
Copyright © Microsoft 2010

Original file name:
Linkury.Personalization.ServicesPlugins.NotepadPlugin.dll

File type:
Dynamic link library (Win32 DLL)

Language:
Language Neutral

Common path:
C:\ProgramData\linkury\servicesplugins\linkury.personalization.servicesplugins.notepadplugin.dll

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
4/13/2011 9:00:00 PM

Valid to:
5/11/2012 8:59:59 PM

Subject:
CN=Linkury, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Linkury, L=Ramat Gan, S=Israel, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
419F551AE006F0B2E53B5248C56F74C1

File PE Metadata
Compilation timestamp:
9/11/2011 3:06:31 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
8.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
192:2U1mknm8EmaT/IIYH+mEWLm+gyowJL/FrVs43Zky+vEQr9ZCspE+TMIrrFeq:2ql5EvT/IIYeRWLm+gYJLbs4LeMO1

Entry address:
0x2C8E

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
3.5 KB (3,584 bytes)