toolbar8586622.exe

kozaka

This is the installer/setup program for a Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application toolbar8586622.exe by kozaka has been detected as adware by 8 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages. It is also typically executed from the user's temporary directory.
Publisher:
kozaka  (signed and verified)

MD5:
2ce16fb25a411cfdbec39b20263093fb

SHA-1:
86ee4062cb7488c23a5077a014c31b180b1e9802

SHA-256:
639b3825fb1e6fa5e00ad4b3212df0ca4d2e4b697b4ac228547adf0f7ec8d601

Scanner detections:
8 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
7/1/2025 12:34:46 PM UTC  (today)

Scan engine
Detection
Engine version

Bkav FE
W32.Clod787.Trojan
1.3.0.4562

ESET NOD32
Win32/BrowseFox
7.9124

G Data
Win32.Trojan.Agent.MFNK2H
13.12.22

Malwarebytes
PUP.Optional.Kozaka.A
v2013.12.06.01

McAfee
Artemis!2CE16FB25A41
5600.7280

Reason Heuristics
PUP.kozaka.O
14.8.7.20

Rising Antivirus
NS:PUF.SilenceInstaller!1.9DDF
23.00.65.131204

Trend Micro House Call
TROJ_GEN.F47V1029
7.2.340

File size:
198.7 KB (203,440 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\appdata\local\temp\toolbar8586622.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
10/7/2013 5:00:00 AM

Valid to:
10/8/2014 4:59:59 AM

Subject:
CN=kozaka, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=kozaka, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
1B38C0B5B092B91BC43EB30DCF78B962

File PE Metadata
Compilation timestamp:
12/6/2009 3:50:41 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
3072:/Lk395hYXJsC6ys6n3FkS9XPcCZT9anH7l1m/GqMHJGULvU:/QqD6y73FkGPPhYnH7nm/G/Hcn

Entry address:
0x30CB

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 38, 3F, 42, 00, E8, F1, 2B, 00, 00, A3, 84, 3E, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 30, F4, 41, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 80, 36, 42, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 90, 42, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Entropy:
7.8962

Packer / compiler:
Nullsoft install system v2.x

Code size:
22.5 KB (23,040 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to a72-246-97-35.deploy.akamaitechnologies.com  (72.246.97.35:80)

TCP (HTTP):

Remove toolbar8586622.exe - Powered by Reason Core Security