maintainer.exe

Scan Tack

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application maintainer.exe by Scan Tack has been detected as adware by 30 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “MaintainerSvc6.74.355882”. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
Scan Tack  (signed and verified)

Version:
1.0.5463.4650

MD5:
0fc17956a1df5281e2c594c09f9e26a2

SHA-1:
b8ba824e6b17a4d5a7be92321811c97f601b61a0

SHA-256:
30fd87e687719a93ce634548e784acc5b74d47452634334032a26dc7415c8523

Scanner detections:
30 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/26/2024 6:34:21 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.SwiftBrowse.Y
6143661

AhnLab V3 Security
Adware/Win32.SwiftBrowse
2014.12.17

Avira AntiVirus
Adware/BrowseFox.apb
7.11.196.12

avast!
Win32:Adware-BYZ [PUP]
141214-1

AVG
Generic6
2015.0.3259

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.141216

Bitdefender
Adware.SwiftBrowse.Y
1.0.20.1750

Clam AntiVirus
Win.Adware.Agent-22685
0.98/21511

Comodo Security
Application.Win32.BrowseFox.B
20387

Dr.Web
Trojan.BPlug.281
9.0.1.05190

Emsisoft Anti-Malware
Adware.SwiftBrowse.Y
9.0.0.4668

ESET NOD32
Win32/BrowseFox.V potentially unwanted application
7.0.302.0

F-Prot
W32/A-de841313
v6.4.7.1.166

F-Secure
Adware.SwiftBrowse.Y
5.13.68

G Data
Adware.SwiftBrowse
14.12.24

IKARUS anti.virus
Win32.SuspectCrc
t3scan.1.8.5.0

K7 AntiVirus
Trojan
13.188.14354

Kaspersky
not-a-virus:AdWare.Win32.Yotoon
15.0.0.543

Malwarebytes
PUP.Optional.SwiftBrowse
v2014.12.16.10

MicroWorld eScan
Adware.SwiftBrowse.Y
15.0.0.1050

NANO AntiVirus
Riskware.Win32.Kranet.dgiwfc
0.28.6.64267

Norman
Adware.SwiftBrowse.Y
04.12.2014 14:30:06

nProtect
Trojan-Clicker/W32.Yotoon.123680
14.12.16.01

Panda Antivirus
Trj/CI.A
14.12.16.10

Quick Heal
AdWare.Yotoon.A5
12.14.14.00

Reason Heuristics
PUP.Service.ScanTack.K
14.12.16.9

SUPERAntiSpyware
Adware.SwiftBrowse
10174

Vba32 AntiVirus
AdWare.Yotoon
3.12.26.3

VIPRE Antivirus
Threat.4741131
35418

Zillya! Antivirus
Adware.Kranet.Win32.476
2.0.0.2007

File size:
120.8 KB (123,680 bytes)

Product version:
1.0.5463.4650

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\ProgramData\6868b380-de26-428c-8695-32ebd47bfa1b\maintainer.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/22/2014 1:00:00 AM

Valid to:
1/23/2015 12:59:59 AM

Subject:
CN=Scan Tack, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Scan Tack, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
44D91A3142283CE62B23F23C84838B0D

File PE Metadata
Compilation timestamp:
12/16/2014 11:35:10 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
1536:53eRgxyOpGX5sfnC6P2dV59IikYYf9J892bbY+m1bcQ/Wm1sWjcdcPQI0ypxCO8U:tK35/9oxfTk+Kvn6cPQI0ypxCOB3bZv

Entry address:
0x8A72

Entry point:
E8, 95, 57, 00, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A1, 68, B2, 41, 00, 33, C5, 89, 45, FC, 83, 7D, 08, FF, 57, 74, 09, FF, 75, 08, E8, 79, 45, 00, 00, 59, 83, A5, E0, FC, FF, FF, 00, 6A, 4C, 8D, 85, E4, FC, FF, FF, 6A, 00, 50, E8, 7A, F3, FF, FF, 8D, 85, E0, FC, FF, FF, 89, 85, D8, FC, FF, FF, 8D, 85, 30, FD, FF, FF, 83, C4, 0C, 89, 85, DC, FC, FF, FF, 89, 85, E0, FD, FF, FF, 89, 8D, DC, FD, FF, FF, 89, 95, D8, FD, FF, FF, 89, 9D, D4, FD, FF, FF, 89, B5, D0, FD, FF, FF, 89, BD, CC...
 
[+]

Code size:
68.5 KB (70,144 bytes)

Service
Display name:
MaintainerSvc6.74.355882

Type:
Win32OwnProcess

Depends on:
RPCSS


Remove maintainer.exe - Powered by Reason Core Security