searchay.exe

The application searchay.exe has been detected as a potentially unwanted program by 4 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer, however the file is not signed with an authenticode signature from a trusted source. While running, it connects to the Internet address cspreport.mail.ru on port 443.
MD5:
fe1432444ec0e3956398ccce912da681

SHA-1:
4c4ee94d3eaea5ed49e5a3f950425a7cc21cc96e

SHA-256:
0526fc02e6d3c31ef1f35fdd1320db6f758d21d750240fae55c9b183dbe123e0

Scanner detections:
4 / 68

Status:
Potentially unwanted

Analysis date:
8/3/2025 9:23:53 PM UTC  (today)

Scan engine
Detection
Engine version

AegisLab AV Signature
Heur.Advml.Gen!c
2.1.4+

ESET NOD32
Win32/TrojanDropper.Addrop
10.14307

Kaspersky
not-a-virus:AdWare.NSIS.MediaMagnet
14.0.0.-580

Reason Heuristics
Adware.Dropper.ET (M)
16.10.19.22

File size:
619 KB (633,819 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\appdata\roaming\searchay\searchay.exe

File PE Metadata
Compilation timestamp:
12/27/2015 8:38:52 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:699X0acCg2MSZUyI+ugWfaHTCesnboG/HZm0a0cAkOPHiQSGM/pGzTsTwj04vDEJ:69WxZLSZqTgHqnh8d0jPij/pGzTsTwQH

Entry address:
0x324F

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 57, 33, DB, 68, 01, 80, 00, 00, 89, 5C, 24, 1C, C7, 44, 24, 14, 30, 91, 40, 00, 33, F6, C6, 44, 24, 18, 20, FF, 15, B8, 70, 40, 00, FF, 15, B4, 70, 40, 00, 66, 3D, 06, 00, 74, 11, 53, E8, FC, 2D, 00, 00, 3B, C3, 74, 07, 68, 00, 0C, 00, 00, FF, D0, 68, E0, 91, 40, 00, E8, 7D, 2D, 00, 00, 68, D8, 91, 40, 00, E8, 73, 2D, 00, 00, 68, CC, 91, 40, 00, E8, 69, 2D, 00, 00, 6A, 0D, E8, CC, 2D, 00, 00, 6A, 0B, E8, C5, 2D, 00, 00, A3, 84, 3F, 42, 00, FF, 15, 34, 70, 40, 00, 53, FF...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to kvmde29-9782.fornex.org  (91.228.155.160:443)

TCP (HTTP):
Connects to ip248.152.odnoklassniki.ru  (217.20.152.248:80)

TCP (HTTP SSL):
Connects to ip159.156.odnoklassniki.ru  (217.20.156.159:443)

TCP (HTTP):
Connects to ip132.156.odnoklassniki.ru  (217.20.156.132:80)

TCP (HTTP SSL):
Connects to cspreport.mail.ru  (94.100.180.226:443)

TCP (HTTP SSL):
Connects to top-fwz1.mail.ru  (217.69.136.176:443)

TCP (HTTP SSL):
Connects to srf.r.smailru.net  (94.100.180.72:443)

TCP (HTTP SSL):
Connects to rfbo2.r.smailru.net  (94.100.180.76:443)

TCP (HTTP SSL):
Connects to r.mradx.net  (217.69.139.244:443)

TCP (HTTP SSL):
Connects to portal.mail.ru  (217.69.139.58:443)

TCP (HTTP SSL):
Connects to mail.ru  (217.69.139.202:443)

TCP (HTTP SSL):
Connects to lr-in-f95.1e100.net  (209.85.233.95:443)

TCP (HTTP SSL):
Connects to limgsko.mail.ru  (94.100.180.211:443)

TCP (HTTP SSL):
Connects to is-radar41.common.radar.imgsmail.ru  (185.5.137.183:443)

TCP (HTTP SSL):
Connects to img-if1-img.mail.ru  (94.100.187.1:443)

TCP (HTTP):
Connects to bratok.mail.ru  (217.69.135.163:80)

TCP (HTTP SSL):
Connects to bar.love.mail.ru  (193.0.170.54:443)

TCP (HTTP):
Connects to amigo.mail.ru  (217.69.139.252:80)

TCP (HTTP SSL):
Connects to ad1.adriver.ru  (81.222.128.11:443)

Remove searchay.exe - Powered by Reason Core Security