ruroni-kenshin-kyoto-taika-hen.exe

OUTBROWSE

This is the OutBrowse Revenyou installer which bundles offers for additional third party applications that may be unwanted and installed without consent. The application ruroni-kenshin-kyoto-taika-hen.exe by OUTBROWSE has been detected as adware by 15 anti-malware scanners. The program is a setup application that uses the OutBrowse Revenyou installer. The setup routine uses the RevenYou.Com Pay Per Install platform (OutBrowse) which bundles additional software offers inclduing toolbars, extensions, PC utilities as well as other PUPs.
Publisher:
OUTBROWSE  (signed and verified)

MD5:
50dd81a174d6c25f98e5e491472c4119

SHA-1:
0bead1bec0bd4ba205cd1ec2ddcef1ad5887502c

SHA-256:
d43562709cc6ad80682d1f513aad596b1d0552468c59cd984b19ef63dd2ab8c5

Scanner detections:
15 / 68

Status:
Adware

Explanation:
Bundles additional adware offers during download and installation using the OutBrowse installer.

Description:
This is an installer which may bundle legitimate applications with offers for additional 3rd-party applications that may be unwanted by the user. While the installer contains an 'opt-out' feature this is not set be defult and is usually overlooked.

Analysis date:
4/26/2024 4:01:37 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.OutBrowse
7.1.1

AhnLab V3 Security
PUP/Win32.OutBrowse
2014.09.30

AVG
Generic
2015.0.3338

Dr.Web
Adware.Downware.2081
9.0.1.0271

ESET NOD32
Win32/OutBrowse.AU
8.10485

G Data
Win32.Application.Outbrowse
14.9.24

herdProtect (fuzzy)
2014.12.9.17

IKARUS anti.virus
PUA.OutBrowse
t3scan.1.7.8.0

K7 AntiVirus
Unwanted-Program
13.183.13521

Kaspersky
not-a-virus:AdWare.Win32.OutBrowse
14.0.0.3184

Malwarebytes
PUP.Optional.OutBrowse
v2014.09.28.05

McAfee
Adware-OutBrowse.a
5600.6994

Reason Heuristics
PUP.OUTBROWSE.EE
14.9.28.5

Sophos
OutBrowse Revenyou
4.98

VIPRE Antivirus
Threat.4784459
33520

File size:
557.1 KB (570,464 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
OutBrowse Revenyou (using Nullsoft Install System)

Common path:
C:\users\{user}\downloads\ruroni-kenshin-kyoto-taika-hen.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
4/7/2014 2:00:00 AM

Valid to:
4/8/2015 1:59:59 AM

Subject:
CN=OUTBROWSE, O=OUTBROWSE, STREET=Bialik Number: 143, L=Ramat Gan, S=Israel, PostalCode=5252337, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00A5F03C3A375C11FD6C1C160EE8BFF923

File PE Metadata
Compilation timestamp:
12/5/2009 11:50:52 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
6144:Ne34fTutkqzFSRgPfapgsoWpcHKzUs8wKIrXt/RtZAC7AFq6VdXAS7U44z993i9E:jiTFZfaSsoZhXQ5RthUFq6DF7/e99M

Entry address:
0x30FA

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 18, EC, 42, 00, E8, F1, 2B, 00, 00, A3, 64, EB, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 98, 8F, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 60, E3, 42, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 40, 43, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

The file ruroni-kenshin-kyoto-taika-hen.exe has been seen being distributed by the following URL.

Remove ruroni-kenshin-kyoto-taika-hen.exe - Powered by Reason Core Security