megabrowse.browseradapter.exe

Mokiray

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application megabrowse.browseradapter.exe by Mokiray has been detected as adware by 21 anti-malware scanners. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
Mokiray  (signed and verified)

MD5:
7736d00655f6bccba17df871075d66c0

SHA-1:
88364b89ba8caa9f1788f1043a1bbfcbee9902fe

SHA-256:
577d27f0c1fa1e1a3989da53bf7601d0e46cfbb65e4ebaee3aa14fba9a7b0904

Scanner detections:
21 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/23/2024 10:47:14 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.SwiftBrowse.8
6505244

Agnitum Outpost
Riskware.Agent
7.1.1

Avira AntiVirus
ADWARE/BrowseFox.Gen
7.11.206.84

AVG
BrowseFox
2016.0.3212

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.1521

Bitdefender
Gen:Variant.Adware.SwiftBrowse.8
1.0.20.160

Clam AntiVirus
Win.Adware.Swiftbrowse-1009
0.98/20012

Comodo Security
TrojWare.Win32.BrowseFox.FX
20920

Dr.Web
Trojan.Yontoo.495
9.0.1.05190

Emsisoft Anti-Malware
Gen:Variant.Adware.SwiftBrowse
9.0.0.4799

ESET NOD32
Win32/BrowseFox.AC potentially unwanted application
7.0.302.0

F-Prot
W32/S-4e584d77
v6.4.7.1.166

F-Secure
Gen:Variant.Adware.SwiftBrowse.8
5.13.68

G Data
Gen:Variant.Adware.SwiftBrowse
15.2.25

K7 AntiVirus
Unwanted-Program
13.193.14824

McAfee
Artemis!7736D00655F6
5600.6868

MicroWorld eScan
Gen:Variant.Adware.SwiftBrowse.8
16.0.0.96

NANO AntiVirus
Riskware.Win32.BrowseFox.dmmpgu
0.30.0.65070

Qihoo 360 Security
HEUR/QVM10.1.Malware.Gen
1.0.0.1015

Reason Heuristics
PUP.Yontoo
15.2.1.5

Zillya! Antivirus
Adware.Agent.Win32.38198
2.0.0.2050

File size:
101.7 KB (104,168 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\Program Files\mega browse\bin\megabrowse.browseradapter.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/5/2015 4:00:00 AM

Valid to:
3/6/2016 3:59:59 AM

Subject:
CN=Mokiray, O=Mokiray, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
13396D8733DD5F35D3FC41477C1EB99D

File PE Metadata
Compilation timestamp:
2/1/2015 1:49:47 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
1536:AjblMH9claS0FXifDauLnE/x3+k+enMByHO0P:mbIWcS0FSfD54tuyHOi

Entry address:
0x4275

Entry point:
E8, C5, 21, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 5D, E9, F3, 05, 00, 00, 3B, 0D, 70, 60, 41, 00, 75, 02, F3, C3, E9, 41, 22, 00, 00, 8B, FF, 55, 8B, EC, 83, EC, 10, EB, 0D, FF, 75, 08, E8, 44, 23, 00, 00, 59, 85, C0, 74, 0F, FF, 75, 08, E8, 8A, 07, 00, 00, 59, 85, C0, 74, E6, C9, C3, F6, 05, D8, 74, 41, 00, 01, BF, CC, 74, 41, 00, BE, 1C, 22, 41, 00, 75, 2C, 83, 0D, D8, 74, 41, 00, 01, 6A, 01, 8D, 45, FC, 50, 8B, CF, C7, 45, FC, 24, 22, 41, 00, E8, 2C, 00, 00, 00, 68, 7E, 13, 41, 00, 89, 35, CC...
 
[+]

Entropy:
6.4050

Code size:
65 KB (66,560 bytes)

Remove megabrowse.browseradapter.exe - Powered by Reason Core Security