tmp00000002d53b36aeb251cb24

Desktop OS

Web Cake

This file is part of the Web Cake web browser extension, an adware plugin for various web browsers designed to deliver context based advertising injected directly in the web pages a user is viewing as well opens advertisements that appear independently outside the context of the program, website, or other source the advertisements are promoting. The file tmp00000002d53b36aeb251cb24 by Web Cake has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. It is part of the Yontoo web-extension that injects advertisements in the browser.
Publisher:
bake cake  (signed by Web Cake)

Product:
Desktop OS

Description:
Desktop.OS

Version:
1.0.0.0

MD5:
83aac6cd42d32fa4115029b7ed5c896e

SHA-1:
bc44724e5a2971007c2b79bae2c11990c16e3699

SHA-256:
06aad4af13a77fd7d50257432e9cda0dd274b61d5bd404daf1f427e11180060f

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Belongs to the Sambreel/Yontoo progam that inserts various forms of advertising in the user's web browser, installed with minimal or no user consent.

Analysis date:
5/15/2024 8:38:40 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Yontoo (M)
16.10.14.8

File size:
512 KB (524,288 bytes)

Product version:
1.0.0.0

Original file name:
Desktop.OS.dll

Language:
Language Neutral

Common path:
C:\windows\temp\tmp00000002d53b36aeb251cb24

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
4/8/2013 9:00:00 PM

Valid to:
4/9/2015 8:59:59 PM

Subject:
CN=Web Cake, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Web Cake, L=Carlsbad, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
06B9035EE5A556582D9427CC2C8DD0BC

File PE Metadata
Compilation timestamp:
7/25/2013 7:06:00 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
8.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
12288:z8UFe0RB/HJLNUMudWT+4Jum0bqGvKuTV:4ZU1JqMudWBOqY5

Entry address:
0xCE56

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
44 KB (45,056 bytes)

Remove tmp00000002d53b36aeb251cb24 - Powered by Reason Core Security