megabrowse.expext.dll

Mokiray

Part of the Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The module megabrowse.expext.dll by Mokiray has been detected as adware by 20 anti-malware scanners. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
Mokiray  (signed and verified)

Version:
1.0.5565.11280

MD5:
cdd558d65ba06851de5a09887d5b418c

SHA-1:
8f60c2d903ef972bd1db803f41e07d7de4f26939

SHA-256:
e069fb55c216c76b3dc660e9fde33a321dde85d28c8e39e9c9d8a080ace6a683

Scanner detections:
20 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
4/24/2024 11:45:17 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Jatif.224
6324531

avast!
MSIL:BrowseFox-L [PUP]
150319-1

AVG
BrowseFox
2016.0.3156

Baidu Antivirus
Adware.MSIL.BrowseFox
4.0.3.15328

Bitdefender
Gen:Variant.Adware.Jatif.224
1.0.20.435

Bkav FE
W32.HfsAdware
1.3.0.6379

Dr.Web
Trojan.Yontoo.1734
9.0.1.087

Emsisoft Anti-Malware
Gen:Variant.Adware.Jatif.224
9.0.0.4799

ESET NOD32
MSIL/BrowseFox.G potentially unwanted (variant)
9.11391

F-Prot
W32/S-5d625b95
v6.4.7.1.166

F-Secure
Gen:Variant.Adware.Jatif
5.13.68

G Data
Gen:Variant.Adware.Jatif.224
15.3.25

IKARUS anti.virus
PUA.MSIL.BrowseFox
t3scan.1.8.9.0

K7 AntiVirus
Adware
13.202.15414

McAfee
Program.BrowseFox-FUT
16.8.708.2

MicroWorld eScan
Gen:Variant.Adware.Jatif.224
16.0.0.261

NANO AntiVirus
Riskware.Win32.BPlug.djpkri
0.30.8.659

Panda Antivirus
Trj/CI.A
15.03.28.04

Reason Heuristics
PUP.Yontoo
15.3.28.16

VIPRE Antivirus
Threat.4741131
38552

File size:
498.7 KB (510,696 bytes)

Product version:
1.0.5565.11280

Original file name:
MegaBrowse.ExpExt2015032814.dll

File type:
Dynamic link library (Win32 DLL)

Language:
Language Neutral

Common path:
C:\Program Files\mega browse\bin\plugins\megabrowse.expext.dll

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
1/4/2015 5:00:00 PM

Valid to:
3/5/2016 4:59:59 PM

Subject:
CN=Mokiray, O=Mokiray, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
13396D8733DD5F35D3FC41477C1EB99D

File PE Metadata
Compilation timestamp:
3/28/2015 8:16:13 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
6.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
12288:5GS/3bI5O82jOV19FZ7riGbvBZjQq8Di2:5lr824FZXJ7QW2

Entry address:
0x7C9DA

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, C0, 07, 00, 0C, 00, 00, 00, DC, 39, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
6.9781

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
490.5 KB (502,272 bytes)

Remove megabrowse.expext.dll - Powered by Reason Core Security