dealkeeper.expext.exe

browsebit

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application dealkeeper.expext.exe by browsebit has been detected as adware by 29 anti-malware scanners. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
browsebit  (signed and verified)

Version:
1.0.6242.39491

MD5:
4ae56d2564852564fc40dd597cb3b438

SHA-1:
a92f7048a083cde7539b15a74df543c5d4803032

SHA-256:
3198b389e52215aa28c628f2a4f65a60b8f58e4f3479b918fd8ae0770dabcde4

Scanner detections:
29 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/30/2024 1:24:29 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Graftor.173090
694

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
PUP/Win32.BrowseFox
2015.03.13

Avira AntiVirus
ADWARE/BrowseFox.Gen2
7.11.216.120

avast!
MSIL:BrowseFox-AE [PUP]
2014.9-150312

AVG
AdPlugin
2016.0.3172

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.15312

Bitdefender
Gen:Variant.Adware.Graftor.173090
1.0.20.355

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Agent-38512
0.98/21511

Comodo Security
Application.Win32.BrowseFox.AK
21388

Emsisoft Anti-Malware
Adware.SwiftBrowse.CX
8.15.03.12.06

ESET NOD32
Win32/BrowseFox.AA potentially unwanted (variant)
9.11311

Fortinet FortiGate
Riskware/BrowseFox
3/12/2015

F-Prot
W32/S-43570a6e
v6.4.7.1.166

F-Secure
Gen:Variant.Adware.Graftor.173090
11.2015-12-03_5

G Data
Adware.SwiftBrowse.CX
15.3.25

herdProtect (fuzzy)
2015.6.14.18

K7 AntiVirus
Trojan
13.197.15035

McAfee
BrowseFox-FVA
5600.6832

MicroWorld eScan
Gen:Variant.Adware.Graftor.173090
16.0.0.213

NANO AntiVirus
Riskware.Win32.BrowseFox.dlbjxp
0.30.0.296

nProtect
Adware.SwiftBrowse.CX
15.03.12.01

Qihoo 360 Security
HEUR/QVM10.1.Malware.Gen
1.0.0.1015

Reason Heuristics
Adware.Yontoo.browsebit
15.3.8.13

Sophos
Generic PUA KJ
4.98

Vba32 AntiVirus
AdWare.MSIL.Agent
3.12.26.3

VIPRE Antivirus
Trojan.Win32.Generic
37736

Zillya! Antivirus
Trojan.Katusha.Win32.37082
2.0.0.2097

File size:
99.2 KB (101,616 bytes)

Product version:
1.0.6242.39491

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\deal keeper\bin\dealkeeper.expext.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
11/5/2014 2:00:00 AM

Valid to:
12/6/2015 1:59:59 AM

Subject:
CN=browsebit, O=browsebit, L=Santa Monica, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
1B278A1F7BC3241533B9B334C9A08514

File PE Metadata
Compilation timestamp:
3/7/2015 1:10:26 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
1536:Sv6Gs16A0wApfI+8G2dBKCKXfPWk6EHIkmnMBcuzX1KgS3Q:H1uw24dKXf+k6cJX1KgS3Q

Entry address:
0x563E

Entry point:
E8, AB, 3C, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 83, 7D, 08, 00, 74, 2D, FF, 75, 08, 6A, 00, FF, 35, 64, 7F, 41, 00, FF, 15, 4C, 20, 41, 00, 85, C0, 75, 18, 56, E8, 2F, 08, 00, 00, 8B, F0, FF, 15, 68, 20, 41, 00, 50, E8, DF, 07, 00, 00, 59, 89, 06, 5E, 5D, C3, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 8B, 54, 24, 0C, 8B, 4C, 24, 04, 85, D2, 74, 69, 33, C0, 8A, 44, 24, 08, 84, C0, 75, 16, 81, FA, 80, 00, 00, 00, 72, 0E, 83, 3D, C0, 91, 41, 00, 00, 74, 05, E9, CD, 3C, 00, 00, 57, 8B...
 
[+]

Entropy:
6.4316

Code size:
65.5 KB (67,072 bytes)

Remove dealkeeper.expext.exe - Powered by Reason Core Security