Smartbar.Personalization.ServicesPlugins.DMP.dll

DefaultMailProvider

ReSoft LTD.

This is part of the Linkury/SnapDo monetization software, a web browser toolbar used to hijack a user's search in order to collect revenues. The SmartBar is a a potentially unwanted toolbar and Windows Gadget that is advertising supported (adware). The module Smartbar.Personalization.ServicesPlugins.DMP.dll by ReSoft has been detected as adware by 4 anti-malware scanners.
Publisher:
Microsoft  (signed by ReSoft LTD.)

Product:
DefaultMailProvider

Version:
1.2.0.0

MD5:
4e4ac6bb9e0456f83d99be6ff85298de

SHA-1:
b4c98baa4099ab6adf57aa307a9d4fccb1e38922

SHA-256:
7413f2c32e10ba457121321e0ebc723f9417f730cc33ade03889ac160a18d9a3

Scanner detections:
4 / 68

Status:
Adware

Analysis date:
4/26/2024 6:26:31 PM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
APPL/Linkury.Gen2
7.11.169.40

AVG
Adware AdInject.Resoft
2014.0.4040

Reason Heuristics
PUP.ReSoft.j
14.10.19.23

Trend Micro House Call
TROJ_GEN.F47V0814
7.2.292

File size:
14 KB (14,336 bytes)

Product version:
1.2.0.0

Copyright:
Copyright © Microsoft 2010

Original file name:
Smartbar.Personalization.ServicesPlugins.DMP.dll

File type:
Dynamic link library (Win32 DLL)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\smartbar\common\servicesplugins\smartbar.personalization.servicesplugins.dmp.dll

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
7/29/2012 8:00:00 PM

Valid to:
7/30/2013 7:59:59 PM

Subject:
CN=ReSoft LTD., O=ReSoft LTD., STREET=4th Hanevi'im, L=Tel Aviv, S=Israel, PostalCode=64356, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
7ABDE829D4244ADA77EE42C7A70C0FA3

File PE Metadata
Compilation timestamp:
2/10/2013 1:46:34 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
8.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
192:E2CeHHKWJmteZ1pJbTEIcmIHT2gVWHcMqnJfHix8fe+PjPW38LWM18og2qIi8:ZCeHj4epREIS/WHcMqnhCxYPLg8ZB

Entry address:
0x314E

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
6.4107

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
4.5 KB (4,608 bytes)