Smartbar.Personalization.ServicesPlugins.MessengerPlugin.dll

MessengerPlugin

Veristaff.com Inc

This is part of the Linkury/SnapDo monetization software, a web browser toolbar used to hijack a user's search in order to collect revenues. The SmartBar is a a potentially unwanted toolbar and Windows Gadget that is advertising supported (adware). The module Smartbar.Personalization.ServicesPlugins.MessengerPlugin.dll by Veristaff.com Inc has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat.
Publisher:
Microsoft  (signed by Veristaff.com Inc)

Product:
MessengerPlugin

Version:
1.2.0.0

MD5:
d4233de16834487fd58578687d7848f4

SHA-1:
cc30f064ae47f5489aed90c227db77f83257f10e

SHA-256:
2eca669afa80c41be117968cb6ecc6453c2287127976646ca5855850f549c693

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
4/25/2024 1:49:06 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Veristaff.v
14.7.28.8

File size:
21.8 KB (22,312 bytes)

Product version:
1.2.0.0

Copyright:
Copyright © Microsoft 2011

Original file name:
Smartbar.Personalization.ServicesPlugins.MessengerPlugin.dll

File type:
Dynamic link library (Win32 DLL)

Common path:
C:\users\{user}\appdata\local\smartbar\common\servicesplugins\smartbar.personalization.servicesplugins.messengerplugin.dll

Digital Signature
Authority:
DigiCert Inc

Valid from:
7/8/2014 9:00:00 PM

Valid to:
7/14/2015 9:00:00 AM

Subject:
CN=Veristaff.com Inc, O=Veristaff.com Inc, L=Wilmington, S=Delaware, C=US

Issuer:
CN=DigiCert Assured ID Code Signing CA-1, OU=www.digicert.com, O=DigiCert Inc, C=US

Serial number:
0B0EA10F13BB9EB2057BECB9A30F59D4

File PE Metadata
Compilation timestamp:
7/22/2014 4:05:12 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
6.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
384:9rbp4m0Lvo4YwTMK6kn/xWBh4mtOIvK9QjW0W3MBOnYPLx8I1M0UM:9r9EwxKn07OIy9QDmMc48mM0UM

Entry address:
0x5312

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
13 KB (13,312 bytes)