plugin.exe

Roll Around

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application plugin.exe by Roll Around has been detected as adware by 17 anti-malware scanners. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
Roll Around  (signed and verified)

Version:
1.0.5536.38819

MD5:
b01eb59f65f838410089943ec8f58e76

SHA-1:
7654acc44faf5a2bd61bcc5c21101b8b7341ad87

SHA-256:
8dccc611c399fb3b2c3989c714610e7290fb6cbe6749876dce6ede8caa85cc29

Scanner detections:
17 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
5/7/2024 7:31:55 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.BrowseFox.BY
701

AhnLab V3 Security
PUP/Win32.Generic
2015.03.06

Avira AntiVirus
ADWARE/BrowseFox.Gen
7.11.212.236

AVG
Adware AdPlugin
2016.0.3179

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.15228

Bitdefender
Adware.BrowseFox.BY
1.0.20.325

Bkav FE
W32.HfsAdware
1.3.0.6379

Emsisoft Anti-Malware
Adware.BrowseFox.BY
8.15.03.06.12

ESET NOD32
Win32/BrowseFox.AF potentially unwanted application
7.0.302.0

F-Secure
Adware.BrowseFox.BY
11.2015-06-03_6

G Data
Adware.BrowseFox.BY
15.3.25

K7 AntiVirus
Unwanted-Program
13.200.15176

MicroWorld eScan
Adware.BrowseFox.BY
16.0.0.195

nProtect
Adware.BrowseFox.BY
15.03.05.01

Reason Heuristics
PUP.Yontoo
15.3.1.15

Sophos
PUA 'Positive Finds' (of type Adware)
5.11

VIPRE Antivirus
Threat.4150696
38050

File size:
457.7 KB (468,720 bytes)

Product version:
1.0.5536.38819

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\ProgramData\2a617352-d396-46a3-a71b-5d89535356cf\plugins\3\plugin.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
12/21/2014 4:00:00 PM

Valid to:
12/22/2015 3:59:59 PM

Subject:
CN=Roll Around, O=Roll Around, L=Los Angeles, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
02A1223E320B2EC6C2C8789B5CB4BB4B

File PE Metadata
Compilation timestamp:
2/27/2015 9:34:10 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
12.0

CTPH (ssdeep):
12288:rKfuLnwXbjAcX+PUilaIgyZTk+qg565jxji:rQX/pkUAnJJM5jxji

Entry address:
0x2553E

Entry point:
E8, CB, F4, 00, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 56, FC, 8B, 75, 0C, 8B, 4E, 08, 33, CE, E8, 68, D0, FF, FF, 6A, 00, 56, FF, 76, 14, FF, 76, 0C, 6A, 00, FF, 75, 10, FF, 76, 10, FF, 75, 08, E8, AE, 47, 00, 00, 83, C4, 20, 5E, 5D, C3, 55, 8B, EC, 51, 53, FC, 8B, 45, 0C, 8B, 48, 08, 33, 4D, 0C, E8, 35, D0, FF, FF, 8B, 45, 08, 8B, 40, 04, 83, E0, 66, 74, 11, 8B, 45, 0C, C7, 40, 24, 01, 00, 00, 00, 33, C0, 40, EB, 6C, EB, 6A, 6A, 01, 8B, 45, 0C, FF, 70, 18, 8B, 45, 0C, FF, 70, 14, 8B, 45, 0C, FF, 70, 0C, 6A...
 
[+]

Entropy:
6.5703

Code size:
348.5 KB (356,864 bytes)

Remove plugin.exe - Powered by Reason Core Security