1p1i9lkpusw==200.exe

Maximum Maker

This is the installer/setup program for a Yontoo adware component, a web browser plugin that injects unwanted ads in the browser. The application 1p1i9lkpusw==200.exe by Maximum Maker has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. It is also typically executed from the user's temporary directory. The file has been seen being downloaded from cdn.maximummaker.com.
Publisher:
Maximum Maker  (signed and verified)

Version:
2.0.5730.33648

MD5:
54fbf17d279d5e99906e0e51d2030bbe

SHA-1:
cbcdcdc4dee0eb8f28cd89b872ca81ec2d739b3d

SHA-256:
fae9e23fb73a28689723dbcf3237b6ee5cc20868fa23320640ada1018c8b32d3

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Belongs to the Sambreel/Yontoo progam that inserts various forms of advertising in the user's web browser, installed with minimal or no user consent.

Analysis date:
11/27/2024 6:48:31 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Yontoo.MaximumMaker.Installer (M)
16.2.29.10

File size:
292 KB (298,960 bytes)

Product version:
2015.09.09

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\1p1i9lkpusw==200.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
6/19/2015 3:00:00 AM

Valid to:
6/19/2016 2:59:59 AM

Subject:
CN=Maximum Maker, O=Maximum Maker, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
651671F09CB06782B6C1FB2E014BBB5E

File PE Metadata
Compilation timestamp:
6/5/2014 2:58:31 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
6144:cQ3s63nM3DoFFjuvf/toNQ8dqLuJoU0U7Hd8CntQOHHM+HFFTjXdpNnT2BW:q63nM3D0Fw/tN8dkmLtpHHHrh7B

Entry address:
0x31E4

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, E0, 73, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, B8, 6C, 44, 00, E8, 1B, 25, 00, 00, 53, 68, 60, 01, 00, 00, A3, C0, 6B, 44, 00, 8D, 44, 24, 38, 50, 53, 68, DB, 73, 40, 00, FF, 15, 58, 71, 40, 00, 68, D0, 73, 40, 00, 68, C0, 2B, 44, 00, E8, 0D, 24, 00, 00, FF, 15, AC, 70, 40, 00, 50, BF, 00, F0, 46, 00, 57, E8, FB, 23, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
22.5 KB (23,040 bytes)

The file 1p1i9lkpusw==200.exe has been seen being distributed by the following URL.

Remove 1p1i9lkpusw==200.exe - Powered by Reason Core Security