setup.exe

sizlsearch

This is the installer and setup program from the sizlsearch branded Yontoo adware web browser extension. This adware injects various forms of advertisements in the user's web browser based on the HTML content and URLs viewed. Ad include banners, in-line context text links, coupons, and search. The program will install an auto-updating background service that will update the software with additional features. The application setup.exe by sizlsearch has been detected as adware by 31 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. It will plug into the web browser and display context-based advertisements by overwriting existing ads or by inserting new ones on various web pages.
Publisher:
sizlsearch  (signed and verified)

MD5:
1f0f82d4a7e117cd09e201930e4e38d0

SHA-1:
de3e9cfc5d985abb51deecf2ddf540886011c135

SHA-256:
c4c72a66a0cce1158110b9345187be914332187bf85e875fc494a34461fedd80

Scanner detections:
31 / 68

Status:
Adware

Explanation:
Injects advertising in the web browser in various formats.

Analysis date:
8/6/2025 3:06:58 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.BHO.Agent.4
870

Agnitum Outpost
PUA.Agent
7.1.1

Avira AntiVirus
ADWARE/BrowseFox.Gen2
7.11.173.16

avast!
BrowseFox-AW [PUP]
140908-2

AVG
Adware BrowseFox.F
2014.0.4015

Baidu Antivirus
Adware.Win32.BrowseFox
4.0.3.14918

Bitdefender
Gen:Variant.Adware.BHO.Agent.4
1.0.20.1305

Comodo Security
Application.Win32.Ciorik.RWLZ
19547

Dr.Web
Trojan.BPlug.93
9.0.1.05190

Emsisoft Anti-Malware
Gen:Variant.Adware.BHO.Agent
14.09.16

ESET NOD32
Win32/BrowseFox.C potentially unwanted application
7.0.302.0

Fortinet FortiGate
Adware/Agent
9/18/2014

F-Prot
W32/BadBHO.AW.gen
v6.4.7.1.166

F-Secure
Gen:Variant.Adware.BHO.Agent.4
11.2014-18-09_5

G Data
Gen:Variant.Adware.BHO.Agent
14.9.24

K7 AntiVirus
Unwanted-Program
13.183.13407

Kaspersky
not-a-virus:AdWare.Win32.Agent
15.0.0.494

Malwarebytes
PUP.Optional.Sizlsearch
v2014.09.18.04

McAfee
Artemis!1F0F82D4A7E1
5600.7004

MicroWorld eScan
Gen:Variant.Adware.BHO.Agent.4
15.0.0.783

NANO AntiVirus
Riskware.Win32.Agent.cqycvd
0.28.2.62151

Panda Antivirus
Trj/CI.A
14.09.18.04

Qihoo 360 Security
HEUR/Malware.QVM06.Gen
1.0.0.1015

Quick Heal
AdWare.Agent.r5 (Not a Virus)
9.14.14.00

Reason Heuristics
PUP.Installer.sizlsearch.F
14.9.16.11

Rising Antivirus
NS:PUF.SilenceInstaller!1.9DDF
23.00.65.14916

Sophos
Generic PUA JP
4.98

SUPERAntiSpyware
Adware.BrowseFox/Variant
10353

Trend Micro House Call
TROJ_GEN.F0C2H00I514
7.2.261

Vba32 AntiVirus
AdWare.Agent
3.12.26.3

VIPRE Antivirus
Threat.4741131
32938

File size:
795.9 KB (815,016 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\appdata\local\microsoft\windows\temporary internet files\content.ie5\{random}\setup.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
11/14/2013 1:00:00 AM

Valid to:
11/15/2014 12:59:59 AM

Subject:
CN=sizlsearch, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=sizlsearch, L=Santa Monica, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
14A03B7644CA6A74D050BBD6188EAA95

File PE Metadata
Compilation timestamp:
12/5/2009 11:52:01 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:9whLAhKvJh1s15Ap/G/8qI9uGit0jdUQpOJq8QsUcuvaphEEPLaptrnCIkRc/:9gch+h6j8qI/it0jvsE90phEEjarCIuk

Entry address:
0x30CB

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 38, 6F, 44, 00, E8, F1, 2B, 00, 00, A3, 84, 6E, 44, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 30, 9C, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 80, 2E, 44, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, F0, 46, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
22.5 KB (23,040 bytes)

The file setup.exe has been seen being distributed by the following URL.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to wac.edgecastcdn.net  (72.21.81.13:80)

TCP (HTTP):
Connects to service.yontoo.com  (8.25.35.148:80)

TCP (HTTP):
Connects to api.yontoo.com  (8.25.35.15:80)

Remove setup.exe - Powered by Reason Core Security