setup.EXE

BrowserOptimizer

KEYDOWNLOAD LTD

The application setup.EXE by KEYDOWNLOAD has been detected as adware by 6 anti-malware scanners. This will display context specific advertisements in the browser as well as attempt to modify the browser's search provider. The file has been seen being downloaded from c5e1492b1a25a9f31b05-5d2b8e6ef6f36775cd67752271e3b0a3.r35.cf2.rackcdn.com.
Publisher:
KeyDownload  (signed by KEYDOWNLOAD LTD)

Product:
BrowserOptimizer

Description:
setup

Version:
1, 0, 0, 1

MD5:
06acb397f1d7bb2d50563126b011c921

SHA-1:
0e9d63e96b677f2345341407e42afef7a6103181

SHA-256:
ac527b341307452b5be8567b9af507be7726b23b0399c1490bd37c9664012a17

Scanner detections:
6 / 68

Status:
Adware

Explanation:
The installer may include an offer for the Babylon Toolbar (a homepage/search hijacker), which is potentially installed with minimal user consent.

Analysis date:
4/18/2024 4:27:02 AM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
TR/Rogue.11995513
7.11.185.228

Dr.Web
Adware.Downware.560
9.0.1.099

ESET NOD32
Win32/KeyDownload.A potentially unwanted application
8.7.0.302.0

NANO AntiVirus
Riskware.Html.Babylon.cwhyhv
0.28.2.60990

Reason Heuristics
PUP.Installer.KEYDOWNLOAD.I
14.8.7.19

VIPRE Antivirus
Threat.4782000
31208

File size:
1.5 MB (1,543,000 bytes)

Product version:
1, 0, 0, 1

Copyright:
KeyDownload Copyright (C) 2013

Original file name:
setup.EXE

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\downloads\setup.exe

Digital Signature
Signed by:

Authority:
Thawte, Inc.

Valid from:
10/22/2012 8:00:00 PM

Valid to:
10/23/2013 7:59:59 PM

Subject:
CN=KEYDOWNLOAD LTD, O=KEYDOWNLOAD LTD, L=Tel Aviv- Jaffa, S=Israel, C=IL

Issuer:
CN=Thawte Code Signing CA - G2, O="Thawte, Inc.", C=US

Serial number:
44DCCD0B7D3CB651EC98DC55DCEEBDA0

File PE Metadata
Compilation timestamp:
5/29/2013 5:16:05 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
24576:5RWbUuCY1NKnY/ZatB5rOQ7G/57HaQOtcGqNProIdRzgHJgfRAmgghUZbkvNE:5RWJNK6atTTGh76nJqNPrL0HJUWghUhj

Entry address:
0x2C0120

Entry point:
60, BE, 00, C0, 54, 00, 8D, BE, 00, 50, EB, FF, 57, EB, 0B, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 75, D1, F8, 89, C5, EB, 0B, 01, DB, 75, 07, 8B...
 
[+]

Entropy:
7.8796

Packer / compiler:
UPX v0.89.6 - v1.02 / v1.05 -v1.24

Code size:
1.5 MB (1,527,808 bytes)

The file setup.EXE has been seen being distributed by the following URL.

Remove setup.EXE - Powered by Reason Core Security