setup.exe

Robokid Technologies

By using the Crossrider framework, this web extension is loaded in the web browser and displays advertisments on web pages not affiliated by the extension or company. These unwanted advertisements are injected by the extension in the browser in the form of common ad types such as banners and text-links. The application setup.exe by Robokid Technologies has been detected as adware by 5 anti-malware scanners. The program is a setup application that uses the Nullsoft Install System installer. It is also typically executed from the user's temporary directory. It is distributed as part of the Brightcircle group of browser-extensions.
Publisher:
Robokid Technologies  (signed and verified)

Description:
Mtjsshtwkl

Version:
21.24.19.15

MD5:
71b524393a1c4e4b8d5e87bc04d7aeba

SHA-1:
847e7fadf0af26ade7383edcc404634e41348876

SHA-256:
4edd0ea835eab7a0675ac22f11a9270d3b6003c45aaee65f2d033ec63510fc33

Scanner detections:
5 / 68

Status:
Adware

Analysis date:
4/23/2024 10:19:16 AM UTC  (today)

Scan engine
Detection
Engine version

AVG
Generic
2015.0.3398

Clam AntiVirus
Win.Adware.Agent-6597
0.98/19168

ESET NOD32
Win32/Packed.ScrambleWrapper.M potentially unwanted application
7.0.302.0

Reason Heuristics
PUP.Installer.RobokidTechnologies.F
14.7.8.6

VIPRE Antivirus
Threat.4150696
31208

File size:
8.1 MB (8,448,096 bytes)

File type:
Executable application (Win32 EXE)

Installer:
Nullsoft Install System

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\setup.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
6/23/2014 2:00:00 AM

Valid to:
6/24/2015 1:59:59 AM

Subject:
CN=Robokid Technologies, O=Robokid Technologies, STREET=Athinodorou 3 Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00ECF35E880AD0F3BC6F82DFB1F2E84CC0

File PE Metadata
Compilation timestamp:
12/4/2012 2:55:02 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.22

CTPH (ssdeep):
196608:kIBdxIwL+deQIQoM3T1Y/fC3vX/n0XZqNswa:kITCkKIe3ZpvX5A

Entry address:
0x4323

Entry point:
55, 89, E5, 57, 56, 53, 81, EC, AC, 01, 00, 00, FF, 15, 74, C3, 44, 00, C7, 04, 24, 01, 80, 00, 00, FF, 15, 58, C4, 44, 00, 53, C7, 04, 24, 00, 00, 00, 00, FF, 15, 98, C4, 44, 00, 56, A3, 40, 3B, 44, 00, C7, 04, 24, 08, 00, 00, 00, E8, 8D, 3B, 00, 00, A3, 9C, 3B, 44, 00, 8D, 85, 84, FE, FF, FF, 57, C7, 44, 24, 10, 00, 00, 00, 00, C7, 44, 24, 0C, 60, 01, 00, 00, 89, 44, 24, 08, C7, 44, 24, 04, 00, 00, 00, 00, C7, 04, 24, 01, B3, 40, 00, FF, 15, AC, C4, 44, 00, 83, EC, 14, C7, 44, 24, 04, 02, B3, 40, 00, C7...
 
[+]

Code size:
34.5 KB (35,328 bytes)

Remove setup.exe - Powered by Reason Core Security