dsrlte.exe

Keep-My-Search LTD

The application dsrlte.exe by Keep-My-Search has been detected as adware by 21 anti-malware scanners. It is set to automatically start when a user logs into Windows via the current user run registry key under the display name ‘Yahoo! Search’. This file is typically installed with the program Yahoo! Search by Pay-by-Ads Ltd which is a potentially unwanted software program. While running, it connects to the Internet address NY1WV3438 on port 80 using the HTTP protocol.
Publisher:
Pay By Ads LTD  (signed by Keep-My-Search LTD)

Version:
1.3.0.0

MD5:
2b93a9a249d744950c52519d78d00216

SHA-1:
80fa194bf288699375698721507bb270af6c2682

SHA-256:
056914d3922cbdee8a985fbad32696057f0806e8c94152f8b1ce6cfb6a2b318e

Scanner detections:
21 / 68

Status:
Adware

Analysis date:
12/25/2024 3:20:09 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Application.Strictor.64185
611

Avira AntiVirus
PUA/Montiera.Gen7
8.3.1.6

Arcabit
Trojan.Application.Strictor.DFAB9
1.0.0.425

AVG
Generic
2016.0.3089

Baidu Antivirus
PUA.Win32.Montiera
4.0.3.1563

Bitdefender
Gen:Variant.Application.Strictor.64185
1.0.20.770

Bkav FE
W32.HfsAdware
1.3.0.6379

Dr.Web
Adware.Downware.11603
9.0.1.0159

Emsisoft Anti-Malware
Gen:Variant.Adware.PayByAds
8.15.06.08.01

ESET NOD32
Win32/Toolbar.Montiera.Q potentially unwanted (variant)
9.11728

F-Prot
W32/S-623312ea
v6.4.7.1.166

F-Secure
Gen:Variant.Application.Strictor
11.2015-03-06_4

G Data
Gen:Variant.Application.Strictor.64185
15.6.25

K7 AntiVirus
Unwanted-Program
13.204.16128

Kaspersky
not-a-virus:Downloader.Win32.Montiera
14.0.0.1942

Malwarebytes
PUP.Optional.PayByAds.A
v2015.06.03.03

MicroWorld eScan
Gen:Variant.Application.Strictor.64185
16.0.0.462

Norman
Gen:Variant.Adware.PayByAds.2
11.20150608

Panda Antivirus
Trj/Genetic.gen
15.06.03.03

Reason Heuristics
PUP.Montiera.KeepMySearch
15.6.3.11

Sophos
PayByAds
4.98

File size:
645.3 KB (660,736 bytes)

Copyright:
All rights reserved.

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\pay-by-ads\yahoo! search\1.3.26.12\dsrlte.exe

Digital Signature
Authority:
DigiCert Inc

Valid from:
9/7/2014 6:00:00 PM

Valid to:
11/12/2015 6:00:00 AM

Subject:
CN=Keep-My-Search LTD, O=Keep-My-Search LTD, L=Tel Aviv, C=IL

Issuer:
CN=DigiCert Assured ID Code Signing CA-1, OU=www.digicert.com, O=DigiCert Inc, C=US

Serial number:
087407E453FFF7E46DB51873975E63CB

File PE Metadata
Compilation timestamp:
6/1/2015 8:51:09 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:FIbX6utAjGAe9Zr4VOZlY9e+e5TRxzwSa1jnJKURV7oXAvfTFKOWWAMRo4B:9yPTZJJz5ajnJK47YaFhPDB

Entry address:
0x5270A

Entry point:
E8, 93, AD, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 8B, 45, 08, 33, C9, 3B, 04, CD, D8, F2, 48, 00, 74, 13, 41, 83, F9, 2D, 72, F1, 8D, 48, ED, 83, F9, 11, 77, 0E, 6A, 0D, 58, 5D, C3, 8B, 04, CD, DC, F2, 48, 00, 5D, C3, 05, 44, FF, FF, FF, 6A, 0E, 59, 3B, C8, 1B, C0, 23, C1, 83, C0, 08, 5D, C3, E8, E5, 38, 00, 00, 85, C0, 75, 06, B8, 40, F4, 48, 00, C3, 83, C0, 08, C3, E8, D2, 38, 00, 00, 85, C0, 75, 06, B8, 44, F4, 48, 00, C3, 83, C0, 0C, C3, 8B, FF, 55, 8B, EC, 56, E8, E2, FF, FF, FF, 8B, 4D, 08...
 
[+]

Entropy:
6.3266

Code size:
455.5 KB (466,432 bytes)

Startup File (User Run)
Registry location:
HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run

Name:
Yahoo! Search

Command:
C:\users\{user}\appdata\local\pay-by-ads\yahoo! search\1.3.26.12\dsrlte.exe


The file dsrlte.exe has been discovered within the following program.

Yahoo! Search  by Pay-by-Ads Ltd
This is NOT associated with Yahoo. Pay-By-Ads' Yahoo! Search is an adware web browser application that displays banner ads as well as contextual link ads that are injected in the web page.
66% remove it
 
Powered by Should I Remove It?

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to ny1wv3280.xglobe.net  (204.145.82.20:80)

TCP (HTTP):
Connects to NY1WV3659  (204.145.82.27:80)

TCP (HTTP):
Connects to NY1WV3561  (204.145.82.26:80)

TCP (HTTP):
Connects to NY1WV3438  (204.145.82.24:80)

TCP (HTTP):
Connects to c4.3e.559e.ip4.static.sl-reverse.com  (158.85.62.196:80)

TCP (HTTP):
Connects to server-52-84-246-175.sfo20.r.cloudfront.net  (52.84.246.175:80)

TCP (HTTP SSL):
Connects to ec2-52-1-139-99.compute-1.amazonaws.com  (52.1.139.99:443)

TCP (HTTP):
Connects to server-52-85-63-35.lhr50.r.cloudfront.net  (52.85.63.35:80)

TCP (HTTP SSL):
Connects to ec2-34-196-191-121.compute-1.amazonaws.com  (34.196.191.121:443)

TCP (HTTP):
Connects to server-54-239-132-174.sfo9.r.cloudfront.net  (54.239.132.174:80)

TCP (HTTP):
Connects to server-54-239-132-147.sfo9.r.cloudfront.net  (54.239.132.147:80)

TCP (HTTP):
Connects to server-54-192-119-157.sfo9.r.cloudfront.net  (54.192.119.157:80)

TCP (HTTP):
Connects to server-52-85-63-242.lhr50.r.cloudfront.net  (52.85.63.242:80)

TCP (HTTP):
Connects to ec2-54-243-161-87.compute-1.amazonaws.com  (54.243.161.87:80)

TCP (HTTP):
Connects to ec2-54-225-239-132.compute-1.amazonaws.com  (54.225.239.132:80)

TCP (HTTP SSL):
Connects to ec2-54-214-243-148.us-west-2.compute.amazonaws.com  (54.214.243.148:443)

TCP (HTTP):
Connects to ec2-52-3-215-241.compute-1.amazonaws.com  (52.3.215.241:80)

TCP (HTTP):
Connects to ec2-23-21-65-158.compute-1.amazonaws.com  (23.21.65.158:80)

TCP (HTTP):
Connects to a23-63-226-129.deploy.static.akamaitechnologies.com  (23.63.226.129:80)

TCP (HTTP):

Remove dsrlte.exe - Powered by Reason Core Security