maintainer.exe

Mokiray

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application maintainer.exe by Mokiray has been detected as adware by 22 anti-malware scanners. It runs as a separate (within the context of its own process) windows Service named “MaintainerSvc3.22.1827446”. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
Mokiray  (signed and verified)

Version:
1.0.5565.17590

MD5:
9d5ec2ec16de18c6c656efdc479c5f41

SHA-1:
d4fe6f3a2977b8227189e268f6aa5b9873f0be0a

SHA-256:
984ad0f0592236aebf77ac71fcf0f4603779fae86cf6640876c4153a5ccfc1f2

Scanner detections:
22 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/24/2024 1:56:49 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Adware.SwiftBrowse.CX
678

AhnLab V3 Security
PUP/Win32.BrowseFox
2015.03.29

Avira AntiVirus
ADWARE/BrowseFox.Gen7
3.6.1.96

avast!
Win32:BrowseFox-FC [PUP]
2014.9-150328

AVG
Adware AdPlugin
2016.0.3156

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.15328

Bitdefender
Gen:Variant.Adware.Graftor.163020
1.0.20.435

Bkav FE
W32.HfsAdware
1.3.0.6379

Dr.Web
Trojan.Yontoo.1734
9.0.1.087

Emsisoft Anti-Malware
Adware.SwiftBrowse.CX
8.15.03.28.04

ESET NOD32
Win32/BrowseFox.V potentially unwanted application
9.7.0.302.0

F-Prot
W32/S-11fc74d1
v6.4.7.1.166

F-Secure
Adware.SwiftBrowse.CX
11.2015-28-03_7

G Data
Gen:Variant.Adware.Graftor.163020
15.3.25

herdProtect (fuzzy)
2015.7.3.5

Kaspersky
not-a-virus:AdWare.Win32.Kranet
14.0.0.1794

McAfee
Program.BrowseFox-FXS
5600.6716

MicroWorld eScan
Gen:Variant.Adware.Graftor.163020
16.0.0.261

NANO AntiVirus
Trojan.Win32.Yontoo.dpmcsm
0.30.8.659

Norman
Gen:Variant.Adware.Graftor.163020
11.20150328

Reason Heuristics
PUP.Service.Yontoo
15.3.28.16

VIPRE Antivirus
Threat.4741131
39354

File size:
125.2 KB (128,232 bytes)

Product version:
1.0.5565.17590

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\ProgramData\application data\06154ba7-7ceb-4959-a6bd-bf38bdec8cc6\maintainer.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/4/2015 5:00:00 PM

Valid to:
3/5/2016 4:59:59 PM

Subject:
CN=Mokiray, O=Mokiray, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
13396D8733DD5F35D3FC41477C1EB99D

File PE Metadata
Compilation timestamp:
3/28/2015 10:46:25 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
3072:8D1Ll2ZpujSiZF4g9sym2UG0IHhxDOkdVc:8BVDFHYKukfc

Entry address:
0x9872

Entry point:
E8, 75, 62, 00, 00, E9, 7F, FE, FF, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A1, 68, C2, 41, 00, 33, C5, 89, 45, FC, 83, 7D, 08, FF, 57, 74, 09, FF, 75, 08, E8, 59, 50, 00, 00, 59, 83, A5, E0, FC, FF, FF, 00, 6A, 4C, 8D, 85, E4, FC, FF, FF, 6A, 00, 50, E8, 7A, F3, FF, FF, 8D, 85, E0, FC, FF, FF, 89, 85, D8, FC, FF, FF, 8D, 85, 30, FD, FF, FF, 83, C4, 0C, 89, 85, DC, FC, FF, FF, 89, 85, E0, FD, FF, FF, 89, 8D, DC, FD, FF, FF, 89, 95, D8, FD, FF, FF, 89, 9D, D4, FD, FF, FF, 89, B5, D0, FD, FF, FF, 89, BD, CC...
 
[+]

Entropy:
6.2071

Code size:
72.5 KB (74,240 bytes)

Service
Display name:
MaintainerSvc3.22.1827446

Type:
Win32OwnProcess

Depends on:
RPCSS


Remove maintainer.exe - Powered by Reason Core Security