dsrlte.exe

Keep-My-Search LTD

The application dsrlte.exe by Keep-My-Search has been detected as adware by 19 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered by a time event. This file is typically installed with the program Yahoo! Search by Pay-by-Ads Ltd which is a potentially unwanted software program.
Publisher:
Pay By Ads LTD  (signed by Keep-My-Search LTD)

Version:
1.3.0.0

MD5:
e6bcd5af0fb047109ccc0320d3b71f85

SHA-1:
231ecee2b0291a384338e1a05a3fdeb4d617aaac

SHA-256:
a3a44d68fe0c978a0a627a342776fb5c3c93ea6cb38a2ba1541bdc04cdac184a

Scanner detections:
19 / 68

Status:
Adware

Analysis date:
4/16/2024 4:23:21 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Application.Strictor.64185
778

Agnitum Outpost
PUA.Toolbar.Montiera
7.1.1

Avira AntiVirus
ADWARE/Adware.Gen7
7.11.196.160

AVG
Generic
2015.0.3256

Bitdefender
Gen:Variant.Application.Strictor.64185
1.0.20.1760

ESET NOD32
Win32/Toolbar.Montiera (variant)
8.10900

Fortinet FortiGate
Riskware/Montiera
1/16/2015

F-Secure
Gen:Variant.Application.Strictor
11.2014-18-12_5

G Data
Gen:Variant.Application.Strictor.64185
14.12.24

K7 AntiVirus
Trojan
13.1814554

Malwarebytes
PUP.Optional.PayByAds.A
v2014.12.18.11

McAfee
Artemis!E6BCD5AF0FB0
5600.6884

MicroWorld eScan
Gen:Variant.Application.Strictor.64185
15.0.0.1056

Reason Heuristics
PUP.Task.Montiera
15.1.16.1

Sophos
PayByAds
4.98

Trend Micro House Call
ADW_TIERAMON
7.2.16

Trend Micro
ADW_TIERAMON
10.465.16

VIPRE Antivirus
Trojan.Win32.Generic
36436

ViRobot
Adware.Agent.634624[h]
2014.3.20.0

File size:
619.8 KB (634,624 bytes)

Copyright:
All rights reserved.

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\pay-by-ads\yahoo! search\1.3.18.5\dsrlte.exe

Digital Signature
Authority:
DigiCert Inc

Valid from:
9/7/2014 8:00:00 PM

Valid to:
11/12/2015 7:00:00 AM

Subject:
CN=Keep-My-Search LTD, O=Keep-My-Search LTD, L=Tel Aviv, C=IL

Issuer:
CN=DigiCert Assured ID Code Signing CA-1, OU=www.digicert.com, O=DigiCert Inc, C=US

Serial number:
087407E453FFF7E46DB51873975E63CB

File PE Metadata
Compilation timestamp:
12/17/2014 9:42:30 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:RlxLpIYfcAbKjD7sDMv/hDeedJDy6vFLPUn5TyUI0EBeXias:9pIvQPeXlFLPUngUZEEi

Entry address:
0x4EE6C

Entry point:
E8, BF, AD, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 8B, 45, 08, 33, C9, 3B, 04, CD, C8, A1, 48, 00, 74, 13, 41, 83, F9, 2D, 72, F1, 8D, 48, ED, 83, F9, 11, 77, 0E, 6A, 0D, 58, 5D, C3, 8B, 04, CD, CC, A1, 48, 00, 5D, C3, 05, 44, FF, FF, FF, 6A, 0E, 59, 3B, C8, 1B, C0, 23, C1, 83, C0, 08, 5D, C3, E8, E8, 38, 00, 00, 85, C0, 75, 06, B8, 30, A3, 48, 00, C3, 83, C0, 08, C3, E8, D5, 38, 00, 00, 85, C0, 75, 06, B8, 34, A3, 48, 00, C3, 83, C0, 0C, C3, 8B, FF, 55, 8B, EC, 56, E8, E2, FF, FF, FF, 8B, 4D, 08...
 
[+]

Entropy:
6.3314

Code size:
438 KB (448,512 bytes)

Scheduled Task
Task name:
Yahoo! Search

Trigger:
Time (Next runs on 12/18/2014 at 11:25 PM)


The file dsrlte.exe has been discovered within the following program.

Yahoo! Search  by Pay-by-Ads Ltd
This is NOT associated with Yahoo. Pay-By-Ads' Yahoo! Search is an adware web browser application that displays banner ads as well as contextual link ads that are injected in the web page.
66% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ny1wv3280.xglobe.net  (204.145.82.20:80)

TCP (HTTP):
Connects to ny1wv3283.xglobe.net  (204.145.82.23:80)

TCP (HTTP):
Connects to NY1WV3659  (204.145.82.27:80)

TCP (HTTP):
Connects to ec2-52-36-174-237.us-west-2.compute.amazonaws.com  (52.36.174.237:80)

TCP (HTTP):
Connects to ec2-23-21-57-51.compute-1.amazonaws.com  (23.21.57.51:80)

TCP (HTTP):
Connects to cds203.yyz.llnw.net  (208.111.181.114:80)

Remove dsrlte.exe - Powered by Reason Core Security