tmp00000001d34a21d3c32250ec

Desktop

Web Cake

This file is part of the Web Cake web browser extension, an adware plugin for various web browsers designed to deliver context based advertising injected directly in the web pages a user is viewing as well opens advertisements that appear independently outside the context of the program, website, or other source the advertisements are promoting. The file tmp00000001d34a21d3c32250ec by Web Cake has been detected as adware by 6 anti-malware scanners. By plugging into the web browser, this extension will inject advertisements both banner and context hyperlinks based on the web sites being visited. It can be installed from the program's website or it may be bundled by third-party software installation programs. It is part of the Yontoo branded browser-extension.
Publisher:
Web Cake  (signed and verified)

Product:
Desktop

Description:
VGCDesktop.OS

Version:
1.0.0.1

MD5:
e9c90ed4111a3251e0a7c3b4e6bab49e

SHA-1:
294ca53634cb0b116b9c1a386c0ea0ac4e1e198e

SHA-256:
ad8b2025a093fc7ffc9ae70e3caf3390876ba211c6b30df02c2374d70d65002f

Scanner detections:
6 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
5/9/2024 1:07:11 AM UTC  (today)

Scan engine
Detection
Engine version

avast!
Win32:Webcake-A [Adw]
160111-0

AVG
Adware AdInject.WebCake
2015.0.4477

Dr.Web
Threat.Undefined
9.0.1.05190

ESET NOD32
MSIL/Adware.Yontoo.A application
7.0.302.0

Reason Heuristics
PUP.Yontoo.WebCake (M)
16.1.11.19

VIPRE Antivirus
Threat.4741131
46426

File size:
512 KB (524,288 bytes)

Product version:
1.0.0.1

Original file name:
Desktop.OS.dll

Common path:
C:\windows\temp\tmp00000001d34a21d3c32250ec

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
4/9/2013 12:00:00 AM

Valid to:
4/9/2015 11:59:59 PM

Subject:
CN=Web Cake, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Web Cake, L=Carlsbad, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
06B9035EE5A556582D9427CC2C8DD0BC

File PE Metadata
Compilation timestamp:
6/6/2013 1:05:43 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
11.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
1536:dohbfwyjz7V2oY1CeM7gXALU91ReWVb9WYkiWbMjw:Mpd0fbALU9/eGbHkVMjw

Entry address:
0xDF0E

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
48 KB (49,152 bytes)

Remove tmp00000001d34a21d3c32250ec - Powered by Reason Core Security