dsrlte.exe

Blarble

The application dsrlte.exe by Blarble has been detected as adware by 18 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered by a time event. This file is typically installed with the program Yahoo! Search by Pay-by-Ads Ltd which is a potentially unwanted software program. While running, it connects to the Internet address ny1wv3280.xglobe.net on port 80 using the HTTP protocol.
Publisher:
Pay By Ads LTD  (signed by Blarble)

Version:
1.3.0.0

MD5:
ca347fb950445c116d4969a5f35935b3

SHA-1:
bd5a846f209c25160bc103219e6d2f326eb6d3e7

SHA-256:
8db11180c185a35516a9d2ea06d6a87c6a668d81f297dbe2157ecfbd9154bd14

Scanner detections:
18 / 68

Status:
Adware

Analysis date:
4/23/2024 8:17:56 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Application.Strictor.64185
748

Avira AntiVirus
ADWARE/Adware.Gen7
7.11.202.56

AVG
Generic
2016.0.3189

Baidu Antivirus
PUA.Win32.Montiera
4.0.3.15117

Bitdefender
Gen:Variant.Application.Strictor.64185
1.0.20.85

Emsisoft Anti-Malware
Gen:Variant.Strictor.74943
8.15.02.23.10

ESET NOD32
Win32/Toolbar.Montiera (variant)
9.11031

Fortinet FortiGate
Riskware/Montiera
1/17/2015

F-Secure
Gen:Variant.Application.Strictor
11.2015-17-01_7

G Data
Gen:Variant.Application.Strictor.64185
15.1.24

K7 AntiVirus
Unwanted-Program
13.194.14938

Malwarebytes
PUP.Optional.PayByAds.A
v2015.01.17.05

MicroWorld eScan
Gen:Variant.Application.Strictor.64185
16.0.0.51

Qihoo 360 Security
HEUR/QVM10.1.Malware.Gen
1.0.0.1015

Reason Heuristics
PUP.Task.Montiera
15.3.1.12

Sophos
PayByAds
4.98

Trend Micro House Call
Suspicious_GEN.F47V0117
7.2.17

VIPRE Antivirus
Trojan.Win32.Generic
37446

File size:
629.7 KB (644,816 bytes)

Copyright:
All rights reserved.

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\pay-by-ads\yahoo! search\1.3.19.2\dsrlte.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
9/30/2014 3:00:00 AM

Valid to:
10/31/2015 2:59:59 AM

Subject:
CN=Blarble, O=Blarble, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
7B29722C0660917240E2DF85990646F3

File PE Metadata
Compilation timestamp:
1/15/2015 3:17:50 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:nCAX2kG9gTmRAc91Wc5lZ/Pinm5l0gAja1DzDy2iwxVXlg:CJPPP6TgAja1rFL1g

Entry address:
0x504BF

Entry point:
E8, BC, AD, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 8B, 45, 08, 33, C9, 3B, 04, CD, 28, D2, 48, 00, 74, 13, 41, 83, F9, 2D, 72, F1, 8D, 48, ED, 83, F9, 11, 77, 0E, 6A, 0D, 58, 5D, C3, 8B, 04, CD, 2C, D2, 48, 00, 5D, C3, 05, 44, FF, FF, FF, 6A, 0E, 59, 3B, C8, 1B, C0, 23, C1, 83, C0, 08, 5D, C3, E8, E5, 38, 00, 00, 85, C0, 75, 06, B8, 90, D3, 48, 00, C3, 83, C0, 08, C3, E8, D2, 38, 00, 00, 85, C0, 75, 06, B8, 94, D3, 48, 00, C3, 83, C0, 0C, C3, 8B, FF, 55, 8B, EC, 56, E8, E2, FF, FF, FF, 8B, 4D, 08...
 
[+]

Code size:
445.5 KB (456,192 bytes)

Scheduled Task
Task name:
Yahoo! Search

Trigger:
Time


The file dsrlte.exe has been discovered within the following program.

Yahoo! Search  by Pay-by-Ads Ltd
This is NOT associated with Yahoo. Pay-By-Ads' Yahoo! Search is an adware web browser application that displays banner ads as well as contextual link ads that are injected in the web page.
66% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to NY1WV3438  (204.145.82.24:80)

TCP (HTTP):
Connects to ny1wv3280.xglobe.net  (204.145.82.20:80)

TCP (HTTP):
Connects to NY1WV3659  (204.145.82.27:80)

TCP (HTTP):
Connects to NY1WV3561  (204.145.82.26:80)

TCP (HTTP):
Connects to know-sspiprxy-vip.network.virginmedia.net  (62.252.172.241:80)

TCP (HTTP):
Connects to ny1wv3283.xglobe.net  (204.145.82.23:80)

TCP (HTTP):
Connects to host-213.158.175.82.tedata.net  (213.158.175.82:80)

TCP (HTTP):
Connects to ec2-35-166-79-8.us-west-2.compute.amazonaws.com  (35.166.79.8:80)

TCP (HTTP):
Connects to 131.subnet180-250-66.speedy.telkom.net.id  (180.250.66.131:80)

TCP (HTTP SSL):
Connects to server-54-230-150-115.sin2.r.cloudfront.net  (54.230.150.115:443)

TCP (HTTP SSL):
Connects to server-54-192-159-141.sin3.r.cloudfront.net  (54.192.159.141:443)

TCP (HTTP SSL):
Connects to ec2-54-235-126-190.compute-1.amazonaws.com  (54.235.126.190:443)

TCP (HTTP SSL):
Connects to ec2-34-196-179-116.compute-1.amazonaws.com  (34.196.179.116:443)

TCP (HTTP):
Connects to a96-17-163-81.deploy.akamaitechnologies.com  (96.17.163.81:80)

Remove dsrlte.exe - Powered by Reason Core Security