file.exe5lrlq1vf.zpf.pendingoverwrite

DownloadManager

beST InstAlL TLl

This is the OutBrowse Revenyou installer which bundles offers for additional third party applications that may be unwanted and installed without consent. The file file.exe5lrlq1vf.zpf.pendingoverwrite by beST InstAlL TLl has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the OutBrowse Revenyou installer. It is also typically executed from the user's temporary directory.
Publisher:
beST InstAlL TLl  (signed and verified)

Product:
DownloadManager

Version:
1.1559.119.0

MD5:
c84bc2f4452acb02ea63d279c700e382

SHA-1:
f06162ef9d4afdba22b58fd3f9deb5f55ec81173

SHA-256:
9b3dba32b9ba967fcdf7c8a168959229fdd30857108910fcf4b896da2d08769c

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/24/2024 4:47:39 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Outbrowse (M)
16.10.14.7

File size:
630.4 KB (645,544 bytes)

Product version:
1.1559.119.0

Bundler/Installer:
OutBrowse Revenyou (using Nullsoft Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\temp\file.exe5lrlq1vf.zpf.pendingoverwrite

Digital Signature
Authority:
thawte, Inc.

Valid from:
5/6/2015 8:00:00 PM

Valid to:
1/27/2016 7:59:59 PM

Subject:
CN=beST InstAlL TLl, O=beST InstAlL TLl, L=Dublin, S=Dublin, C=IE

Issuer:
CN=thawte SHA256 Code Signing CA, O="thawte, Inc.", C=US

Serial number:
438E5CB94E60B26DBE826D2613121543

File PE Metadata
Compilation timestamp:
12/5/2009 6:52:12 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:bkyHbGc67pb63mpqWTw2Grdbp663zq9+5dBG32rvf4SMKwcCa8tQ5SI3phQ9PQG:b9bkdb62tTsp659+5dBbrndMtcCa8u3p

Entry address:
0x30FA

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 18, 1C, 45, 00, E8, F1, 2B, 00, 00, A3, 64, 1B, 45, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 98, 37, 43, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 60, DB, 44, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, A0, 47, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Entropy:
7.9702

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

Remove file.exe5lrlq1vf.zpf.pendingoverwrite - Powered by Reason Core Security