onlysearch.exe

PayByAds ltd.

The application onlysearch.exe by PayByAds ltd has been detected as adware by 22 anti-malware scanners. It runs as a scheduled task under the Windows Task Scheduler triggered by a time event.
Publisher:
Pay By Ads LTD  (signed by PayByAds ltd.)

Version:
1.3.0.0

MD5:
0255d76e8acb081cc3d5b48ef8d66755

SHA-1:
99555217817db151fb89a523a0d5f651374b8e55

SHA-256:
9fcbd98764da1a4afa618c8d93431d29ef35fe4bf1c3aae1cabce4b34909007d

Scanner detections:
22 / 68

Status:
Adware

Analysis date:
4/25/2024 7:33:06 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Strictor.64185
780

Avira AntiVirus
Adware/Agent.Montiera.Q
7.11.183.246

AVG
Paybyads
2015.0.3314

Baidu Antivirus
Hacktool.Win32.Montiera
4.0.3.141022

Bitdefender
Gen:Variant.Strictor.64185
1.0.20.1750

Comodo Security
ApplicUnwnt
20043

Emsisoft Anti-Malware
Gen:Variant.Strictor.64185
8.14.12.16.12

ESET NOD32
Win32/Toolbar.Montiera (variant)
8.10615

Fortinet FortiGate
Riskware/Montiera
1/16/2015

F-Secure
Gen:Variant.Strictor.64185
11.2014-16-12_3

G Data
Gen:Variant.Strictor.64185
14.12.24

IKARUS anti.virus
not-a-virus:Downloader.Montiera
t3scan.1.8.3.0

K7 AntiVirus
Trojan
13.185.13965

Kaspersky
not-a-virus:Downloader.Win32.Montiera
14.0.0.3065

Malwarebytes
PUP.Optional.PayByAds.A
v2014.10.22.01

McAfee
Artemis!899860BFF838
5600.6914

MicroWorld eScan
Gen:Variant.Strictor.64185
15.0.0.1050

Qihoo 360 Security
Win32/Virus.Downloader.42e
1.0.0.1015

Reason Heuristics
PUP.Task.Montiera
15.1.16.1

Sophos
PayByAds
4.98

Trend Micro House Call
TROJ_GEN.R047C0EK814
7.2.16

VIPRE Antivirus
Montiera
34114

File size:
521.4 KB (533,864 bytes)

Copyright:
All rights reserved.

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\onlysearch\onlysearch\1.3.15.1\onlysearch.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
7/27/2014 9:00:00 PM

Valid to:
7/28/2015 8:59:59 PM

Subject:
CN=PayByAds ltd., O=PayByAds ltd., STREET="Herbert Samuel, 46", L=Tel Aviv, S=Israel, PostalCode=6330303, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00CA9E6FD9AC89FBB9BC192CA9530A98F5

File PE Metadata
Compilation timestamp:
10/20/2014 5:26:49 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:ZVVSHAo92fBGz5cOF6q/IrGV2EOJ36ViGCXoX:iUKV2EOJo1CX0

Entry address:
0x415E9

Entry point:
E8, 3A, 84, 00, 00, E9, 89, FE, FF, FF, B8, 6D, A5, 44, 00, A3, D0, 39, 47, 00, C7, 05, D4, 39, 47, 00, 63, 9C, 44, 00, C7, 05, D8, 39, 47, 00, 17, 9C, 44, 00, C7, 05, DC, 39, 47, 00, 50, 9C, 44, 00, C7, 05, E0, 39, 47, 00, B9, 9B, 44, 00, A3, E4, 39, 47, 00, C7, 05, E8, 39, 47, 00, E5, A4, 44, 00, C7, 05, EC, 39, 47, 00, D5, 9B, 44, 00, C7, 05, F0, 39, 47, 00, 37, 9B, 44, 00, C7, 05, F4, 39, 47, 00, C3, 9A, 44, 00, C3, 8B, FF, 55, 8B, EC, E8, 96, FF, FF, FF, 83, 7D, 08, 00, 74, 05, E8, 28, 8F, 00, 00, DB...
 
[+]

Code size:
360 KB (368,640 bytes)

Scheduled Task
Task name:
Only-search

Trigger:
Time (Next runs on 22/10/2014 at 2:55)


Remove onlysearch.exe - Powered by Reason Core Security