maucampo.browseradapter.exe

maucampo

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application maucampo.browseradapter.exe by maucampo has been detected as adware by 19 anti-malware scanners. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
maucampo  (signed and verified)

MD5:
f0c5119a4459cdbc57a50fad6d214b37

SHA-1:
a43c6654bf41b9c23a47624c320503a837759644

SHA-256:
ca0ddd3eb1b3535dcc339031812e946cd9dcc97669e8d0ae9b5c974891ed1461

Scanner detections:
19 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/29/2024 4:37:40 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.SwiftBrowse.8
688

avast!
MSIL:BrowseFox-AD [PUP]
150319-0

AVG
Adware AdPlugin.CUJ
2014.0.4257

Bitdefender
Gen:Variant.Adware.SwiftBrowse.8
1.0.20.875

Clam AntiVirus
Win.Adware.Agent-37332
0.98/21511

Comodo Security
TrojWare.Win32.BrowseFox.FX
21068

Dr.Web
Trojan.BPlug.934
9.0.1.05190

Emsisoft Anti-Malware
Adware.BrowseFox.AU
9.0.0.4799

ESET NOD32
Win32/BrowseFox.AC potentially unwanted application
7.0.302.0

F-Prot
W32/S-a777f78c
v6.4.7.1.166

F-Secure
Gen:Variant.Adware.SwiftBrowse.8
11.2015-24-06_4

K7 AntiVirus
Trojan
13.194.14961

McAfee
Program.BrowseFox-FVR
16.8.708.2

MicroWorld eScan
Gen:Variant.Adware.SwiftBrowse.8
16.0.0.525

NANO AntiVirus
Riskware.Win32.SwiftBrowse.dnpvbt
0.30.0.65070

Reason Heuristics
PUP.Yontoo
15.3.19.3

VIPRE Antivirus
Threat.4741131
38552

Zillya! Antivirus
Trojan.Katusha.Win32.36918
2.0.0.2066

File size:
103.2 KB (105,704 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\maucampo\bin\maucampo.browseradapter.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
11/4/2014 2:00:00 AM

Valid to:
1/4/2016 1:59:59 AM

Subject:
CN=maucampo, O=maucampo, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
11C74807B8FFBCDF069F913CBA56C483

File PE Metadata
Compilation timestamp:
3/18/2015 11:58:09 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
1536:4sTpawrfL7e9Fe7NgPZIeK+HkLn8B6keaGSC2:4sgiTi9FsN+PFL5Gu

Entry address:
0x4535

Entry point:
E8, C5, 21, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 5D, E9, F3, 05, 00, 00, 3B, 0D, 70, 60, 41, 00, 75, 02, F3, C3, E9, 41, 22, 00, 00, 8B, FF, 55, 8B, EC, 83, EC, 10, EB, 0D, FF, 75, 08, E8, 44, 23, 00, 00, 59, 85, C0, 74, 0F, FF, 75, 08, E8, 8A, 07, 00, 00, 59, 85, C0, 74, E6, C9, C3, F6, 05, F8, 74, 41, 00, 01, BF, EC, 74, 41, 00, BE, 24, 22, 41, 00, 75, 2C, 83, 0D, F8, 74, 41, 00, 01, 6A, 01, 8D, 45, FC, 50, 8B, CF, C7, 45, FC, 2C, 22, 41, 00, E8, 2C, 00, 00, 00, 68, 0E, 17, 41, 00, 89, 35, EC...
 
[+]

Entropy:
6.3879

Code size:
66 KB (67,584 bytes)

Remove maucampo.browseradapter.exe - Powered by Reason Core Security