setup.exe

Robokid Technologies

By using the Crossrider framework, this web extension is loaded in the web browser and displays advertisments on web pages not affiliated by the extension or company. These unwanted advertisements are injected by the extension in the browser in the form of common ad types such as banners and text-links. The application setup.exe by Robokid Technologies has been detected as adware by 12 anti-malware scanners. The program is a setup application that uses the Nullsoft Install System installer. It is also typically executed from the user's temporary directory. It is part of the Brightcircle group of web-extensions that inject advertisements in the browser.
Publisher:
Robokid Technologies  (signed and verified)

Description:
Gpklhh

Version:
15.19.14.20

MD5:
3a5fb8570a2c505c486131e19edc6507

SHA-1:
6d1db94926ab22bbfb3739dd59dfdb0cd6334e1b

SHA-256:
a544ec494b4a4e1237eef514a6041a606df41fa3e19d1649efc305720ccec3c3

Scanner detections:
12 / 68

Status:
Adware

Explanation:
May modify the web browser's settings including changing the homepage and search provider in addition to delivering ads (by injecting banner and text-links directly in the webpage).

Analysis date:
4/20/2024 1:14:54 AM UTC  (today)

Scan engine
Detection
Engine version

AVG
Generic
2015.0.3400

Clam AntiVirus
Win.Adware.Agent-6597
0.98/21411

ESET NOD32
Win32/Packed.ScrambleWrapper
8.10122

IKARUS anti.virus
AdWare.Adload
t3scan.1.6.1.0

K7 AntiVirus
Trojan
13.181.12775

Malwarebytes
v2014.07.28.09

McAfee
Artemis!3A5FB8570A2C
5600.7056

Qihoo 360 Security
HEUR/Malware.QVM20.Gen
1.0.0.1015

Reason Heuristics
PUP.Installer.RobokidTechnologies.F
14.7.28.9

Sophos
Generic PUA GN
4.98

Trend Micro House Call
Suspicious_GEN.F47V0716
7.2.209

VIPRE Antivirus
Trojan.Win32.Generic
31400

File size:
7.7 MB (8,053,496 bytes)

File type:
Executable application (Win32 EXE)

Installer:
Nullsoft Install System

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\setup.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
6/22/2014 9:00:00 PM

Valid to:
6/23/2015 8:59:59 PM

Subject:
CN=Robokid Technologies, O=Robokid Technologies, STREET=Athinodorou 3 Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00ECF35E880AD0F3BC6F82DFB1F2E84CC0

File PE Metadata
Compilation timestamp:
12/4/2012 10:55:02 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.22

CTPH (ssdeep):
196608:tQl6vpj5HjKLuDBw73K1oV7vcAOojJgR0isTAql:tQGj5HjKLuFC3SoV7vbOIlpTAS

Entry address:
0x4323

Entry point:
55, 89, E5, 57, 56, 53, 81, EC, AC, 01, 00, 00, FF, 15, 74, C3, 44, 00, C7, 04, 24, 01, 80, 00, 00, FF, 15, 58, C4, 44, 00, 53, C7, 04, 24, 00, 00, 00, 00, FF, 15, 98, C4, 44, 00, 56, A3, 40, 3B, 44, 00, C7, 04, 24, 08, 00, 00, 00, E8, 8D, 3B, 00, 00, A3, 9C, 3B, 44, 00, 8D, 85, 84, FE, FF, FF, 57, C7, 44, 24, 10, 00, 00, 00, 00, C7, 44, 24, 0C, 60, 01, 00, 00, 89, 44, 24, 08, C7, 44, 24, 04, 00, 00, 00, 00, C7, 04, 24, 01, B3, 40, 00, FF, 15, AC, C4, 44, 00, 83, EC, 14, C7, 44, 24, 04, 02, B3, 40, 00, C7...
 
[+]

Code size:
34.5 KB (35,328 bytes)

Remove setup.exe - Powered by Reason Core Security