dtuser.exe

IAC Search and Media

This is a component of the Ask.com toolbar, a browser extension that will modify the default web browser's search provider, home page and various other settings. The application dtuser.exe by IAC Search and Media has been detected as a potentially unwanted program by 8 anti-malware scanners.
Publisher:
IAC Search and Media, Inc.  (signed by IAC Search and Media)

Description:
DtUser

Version:
1, 0, 0, 102

MD5:
de3adee10372c5722bb1749a10f535b2

SHA-1:
5129dcea13d40731f72d4d3661460fa415b98cff

SHA-256:
747f99a4476a5a21a92a4ca71c0ee4bd9107b21be62e331ffed07413c565cc58

Scanner detections:
8 / 68

Status:
Potentially unwanted

Analysis date:
5/10/2024 11:10:11 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.Toolbar.Visicom
7.1.1

AVG
Search
2016.0.2920

Baidu Antivirus
PUA.Win32.Visicom
4.0.3.151119

Dr.Web
Adware.Toolbar.246
9.0.1.0323

ESET NOD32
Win32/Toolbar.Visicom.C potentially unwanted (variant)
9.11177

Fortinet FortiGate
Riskware/Visicom
11/19/2015

Reason Heuristics
PUP.Ask.IACSearchandMedia (M)
15.11.19.22

VIPRE Antivirus
Trojan.Win32.Generic
37564

File size:
495.9 KB (507,808 bytes)

Product version:
1, 0, 0, 102

Copyright:
© 2010-2013 IAC Search and Media, Inc. All Rights Reserved

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\Program Files\perionwhitesmokedtxmediatoolbar222\ie\dtuser.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
1/22/2014 7:00:00 PM

Valid to:
10/20/2015 7:59:59 PM

Subject:
CN=IAC Search and Media, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=IAC Search and Media, L=Oakland, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
5367F5135FCC8B151C3E3EE4BEFD1DFB

File PE Metadata
Compilation timestamp:
4/10/2014 6:24:52 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
12288:QWAsEa60NGXSF3ZK2OqTebzA7SQF/nITTozjTrwTZM:QWAsEL0eSFQZvVQZnITTofTrwtM

Entry address:
0x1D47D

Entry point:
E8, 17, 86, 00, 00, E9, 79, FE, FF, FF, 8B, FF, 55, 8B, EC, 5D, E9, 8B, 07, 00, 00, 8B, FF, 55, 8B, EC, FF, 75, 08, 51, E8, FF, 86, 00, 00, 59, 59, 5D, C2, 04, 00, 8B, FF, 51, C7, 01, C8, 97, 45, 00, E8, 7B, 86, 00, 00, 59, C3, 8B, FF, 55, 8B, EC, 56, 8B, F1, E8, E3, FF, FF, FF, F6, 45, 08, 01, 74, 07, 56, E8, B8, FF, FF, FF, 59, 8B, C6, 5E, 5D, C2, 04, 00, 8B, FF, 55, 8B, EC, FF, 75, 08, 51, E8, 52, 88, 00, 00, 59, 59, 5D, C2, 04, 00, 8B, FF, 51, E8, A1, 87, 00, 00, 59, C3, 8B, FF, 55, 8B, EC, 8B, 45, 08...
 
[+]

Entropy:
6.9313

Code size:
306.5 KB (313,856 bytes)

Remove dtuser.exe - Powered by Reason Core Security