Threat Database Adware Adware.Barnyard Deals

Adware.Barnyard Deals

By CagedTech in Adware

Threat Scorecard

Threat Level: 20 % (Normal)
Infected Computers: 99
First Seen: May 21, 2014
Last Seen: May 2, 2022
OS(es) Affected: Windows

Adware.Barnyard Deals is an adware threat that may be installed on a computer system without a PC user's consent or as an optional program bundled with free software that computer users can download and install from questionable download websites. Adware.Barnyard Deals may lead to various problems when computer users surf the Web. Adware.Barnyard Deals may create and show intrusive in-text hyperlink ads and pop-up ads carrying various deals, offers and discount for online shopping to flood the PC on the websites the PC user visits. Adware.Barnyard Deals may result in search provider redirect problems when the PC user searches anything on well-known search engines. Adware.Barnyard Deals may be designed with the goal to gain profit from clicks on ads and increased traffic of the sponsored website.

SpyHunter Detects & Remove Adware.Barnyard Deals

File System Details

Adware.Barnyard Deals may create the following file(s):
# File Name MD5 Detections
1. FrameworkEngine.exe ed4216c478a1dacd4f5a97eca028e0dd 3
2. FrameworkEngine.exe 0b283dbbd817462194d5bde444db8247 2
3. barnyarddeals.exe c925b806ea34d28201c4688ee0c96508 2
4. FrameworkEngine.exe 3cdb664f4ece6ad303ac024070f36586 1
5. FrameworkBHO64.dll daa8f80b63e6379a91b6d731d2516eaa 1

Registry Details

Adware.Barnyard Deals may create the following registry entry or registry entries:
SOFTWARE\38909
SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Ext\CLSID\{742C1B62-1C8F-447A-96B2-82AA31F5097D}
SOFTWARE\Wow6432Node\38909

Directories

Adware.Barnyard Deals may create the following directory or directories:

%APPDATA%\Microsoft\Windows\Start Menu\Programs\Barnyard Deals
%LOCALAPPDATA%\Barnyard Deals
%LOCALAPPDATA%\Google\Chrome\User Data\Default\Extensions\emaaffabedhbmafgclglcbgiplbolbdd
%PROGRAMFILES%\Barnyard Deals
%PROGRAMFILES(x86)%\Barnyard Deals
%USERPROFILE%\AppData\LocalLow\{742C1B62-1C8F-447A-96B2-82AA31F5097D}

Trending

Most Viewed

Loading...