maintainer.bak

AtuZi

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The file maintainer.bak by AtuZi has been detected as adware by 35 anti-malware scanners. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
AtuZi  (signed and verified)

Version:
1.0.5506.41169

MD5:
90ad68fa8e7633abb77d3525f7449fb2

SHA-1:
d207195498c3fdca646b71bfd720c68741a49957

SHA-256:
02d31be1659b68c4e76b47d9f7ba2936352978567ecf7acef3fa85cf0142d708

Scanner detections:
35 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
5/1/2024 8:31:50 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.SwiftBrowse.CO
6505302

AhnLab V3 Security
Adware/Win32.SwiftBrowse
2015.02.01

Avira AntiVirus
ADWARE/BrowseFox.Gen7
7.11.206.68

avast!
Win32:Adware-BYZ [PUP]
150101-1

AVG
Adware Generic6.DAP
2014.0.4257

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.1521

Bitdefender
Adware.SwiftBrowse.CO
1.0.20.160

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Agent-22685
0.98/20012

Comodo Security
Application.Win32.BrowseFox.B
20920

Dr.Web
Trojan.BPlug.281
9.0.1.05190

Emsisoft Anti-Malware
Adware.SwiftBrowse.CO
9.0.0.4799

ESET NOD32
Win32/BrowseFox.V potentially unwanted application
7.0.302.0

F-Prot
W32/A-de841313
v6.4.7.1.166

F-Secure
Adware.SwiftBrowse.CO
5.13.68

G Data
Adware.SwiftBrowse.CO
15.2.25

IKARUS anti.virus
AdWare.SwiftBrowse
t3scan.1.8.6.0

K7 AntiVirus
Trojan
13.193.14824

Kaspersky
not-a-virus:AdWare.Win32.Yotoon
15.0.0.543

Malwarebytes
PUP.Optional.SwiftBrowse
v2015.02.01.04

McAfee
Program.BrowseFox-FTR
16.8.708.2

MicroWorld eScan
Adware.SwiftBrowse.CO
16.0.0.96

NANO AntiVirus
Riskware.Win32.Kranet.dgiwfc
0.30.0.65070

Norman
Adware.SwiftBrowse.CO
02.01.2015 13:58:24

nProtect
Trojan-Clicker/W32.Yotoon.123672
15.01.30.01

Panda Antivirus
Trj/CI.A
15.02.01.04

Qihoo 360 Security
HEUR/QVM10.1.Malware.Gen
1.0.0.1015

Quick Heal
AdWare.Yotoon.A5
2.15.14.00

Reason Heuristics
PUP.Yontoo
15.2.1.4

Sophos
PUA 'Browse Fox'
5.10

SUPERAntiSpyware
Adware.SwiftBrowse
10081

Trend Micro House Call
TROJ_GEN.R0C1C0EAT15
7.2.32

Trend Micro
TROJ_GEN.R0C1C0EAT15
10.465.01

Vba32 AntiVirus
AdWare.Yotoon
3.12.26.3

VIPRE Antivirus
Threat.4741131
36666

File size:
120.8 KB (123,672 bytes)

Product version:
1.0.5506.41169

Language:
English (United States)

Common path:
C:\ProgramData\2d59c1f1-1b49-4b07-808d-b3efb9779fdf\maintainer.bak

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
4/17/2014 7:00:00 AM

Valid to:
4/18/2015 6:59:59 AM

Subject:
CN=AtuZi, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=AtuZi, L=Santa Monica, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
1095EBEC0EFD96E9E4C801DCA0909C26

File PE Metadata
Compilation timestamp:
1/29/2015 1:52:27 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
3072:SK35/9oxfTk+ovn6GPQI0ypxCOc3bZvp6:SKCLPMTLcrZvp6

Entry address:
0x8A72

Entry point:
E8, 95, 57, 00, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A1, 68, B2, 41, 00, 33, C5, 89, 45, FC, 83, 7D, 08, FF, 57, 74, 09, FF, 75, 08, E8, 79, 45, 00, 00, 59, 83, A5, E0, FC, FF, FF, 00, 6A, 4C, 8D, 85, E4, FC, FF, FF, 6A, 00, 50, E8, 7A, F3, FF, FF, 8D, 85, E0, FC, FF, FF, 89, 85, D8, FC, FF, FF, 8D, 85, 30, FD, FF, FF, 83, C4, 0C, 89, 85, DC, FC, FF, FF, 89, 85, E0, FD, FF, FF, 89, 8D, DC, FD, FF, FF, 89, 95, D8, FD, FF, FF, 89, 9D, D4, FD, FF, FF, 89, B5, D0, FD, FF, FF, 89, BD, CC...
 
[+]

Entropy:
6.1802

Code size:
68.5 KB (70,144 bytes)

Remove maintainer.bak - Powered by Reason Core Security