dlg_audiograbber_product+website_default.exe

Cyberservices B.V.

This is the OutBrowse Revenyou installer which bundles offers for additional third party applications that may be unwanted and installed without consent. The application dlg_audiograbber_product+website_default.exe by Cyberservices B.V has been detected as adware by 7 anti-malware scanners. The program is a setup application that uses the OutBrowse Revenyou installer. The file has been seen being downloaded from www.audiograbber.de and multiple other hosts.
Publisher:
Cyberservices B.V.  (signed and verified)

MD5:
b4e7d65d8652da709cebc65cfa58f324

SHA-1:
0ea8b6ff0d2dd92de3eb3fd64bf7109d61af4fc1

SHA-256:
89e31095f20a0d1fc73f5c350c66ccecec41d34903bc5eac1d16a50f0f9d7a11

Scanner detections:
7 / 68

Status:
Adware

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
11/27/2024 3:48:49 AM UTC  (today)

Scan engine
Detection
Engine version

AVG
Adware Generic_r.OC
2014.0.3972

Dr.Web
Adware.Downware.5119
9.0.1.05190

ESET NOD32
Win32/DownloadGuide.A potentially unwanted application
7.0.302.0

F-Secure
Adware:W32/Buzzrin
11.2014-25-06_4

Reason Heuristics
PUP.CyberservicesBV.i
14.6.25.6

Total Defense
Win32/Tnega.VBMKZGD
37.0.11020

VIPRE Antivirus
Threat.4890059
29708

File size:
458 KB (469,016 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
OutBrowse Revenyou

Language:
English (United States)

Digital Signature
Authority:
COMODO CA Limited

Valid from:
2/10/2014 1:00:00 AM

Valid to:
2/11/2016 12:59:59 AM

Subject:
CN=Cyberservices B.V., O=Cyberservices B.V., STREET=Keizersgracht 62-64 NL, L=Amsterdam, S=Nordholland, PostalCode=1015CS, C=NL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
797CAC4561E8B8B21910CD01E0002669

File PE Metadata
Compilation timestamp:
6/6/2014 9:59:28 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
6144:OqiYD1rcPt3QC/8Y5LUjUJIDaM+zTlztEtuKGdk8yF6GH8VPflPraKm33Bo0WtCy:OYcPtTX5RYX+zZ4vuVX1Hh0WtC7uM1vG

Entry address:
0x1C994

Entry point:
E8, A0, 48, 00, 00, E9, 89, FE, FF, FF, CC, CC, 8B, 44, 24, 08, 8B, 4C, 24, 10, 0B, C8, 8B, 4C, 24, 0C, 75, 09, 8B, 44, 24, 04, F7, E1, C2, 10, 00, 53, F7, E1, 8B, D8, 8B, 44, 24, 08, F7, 64, 24, 14, 03, D8, 8B, 44, 24, 08, F7, E1, 03, D3, 5B, C2, 10, 00, 8B, FF, 55, 8B, EC, 83, EC, 20, 8B, 45, 08, 56, 57, 6A, 08, 59, BE, 0C, DE, 42, 00, 8D, 7D, E0, F3, A5, 89, 45, F8, 8B, 45, 0C, 5F, 89, 45, FC, 5E, 85, C0, 74, 0C, F6, 00, 08, 74, 07, C7, 45, F4, 00, 40, 99, 01, 8D, 45, F4, 50, FF, 75, F0, FF, 75, E4, FF...
 
[+]

Code size:
170.5 KB (174,592 bytes)

The file dlg_audiograbber_product+website_default.exe has been seen being distributed by the following 3 URLs.

Remove dlg_audiograbber_product+website_default.exe - Powered by Reason Core Security