setup.exe

Robokid Technologies

By using the Crossrider framework, this web extension is loaded in the web browser and displays advertisments on web pages not affiliated by the extension or company. These unwanted advertisements are injected by the extension in the browser in the form of common ad types such as banners and text-links. The application setup.exe by Robokid Technologies has been detected as adware by 5 anti-malware scanners. The program is a setup application that uses the Nullsoft Install System installer. It is also typically executed from the user's temporary directory. It is part of the Brightcircle group of web-extensions that inject advertisements in the browser.
Publisher:
Robokid Technologies  (signed and verified)

Description:
Kgiclwprjajng

Version:
12.16.14.17

MD5:
e2bb56121a85974c363c48a3bb211d00

SHA-1:
84b26cddfc59642e73bc8f3d054564d7894577b3

SHA-256:
bc95fe7a28d2883e085e024ee35c2dc4f4f74076733e819c82258fd4067640f1

Scanner detections:
5 / 68

Status:
Adware

Analysis date:
4/19/2024 12:45:20 PM UTC  (today)

Scan engine
Detection
Engine version

AVG
Generic
2015.0.3404

Clam AntiVirus
Win.Adware.Agent-6597
0.98/19168

IKARUS anti.virus
PUA.PlusHD
t3scan.1.6.1.0

Reason Heuristics
PUP.Installer.RobokidTechnologies.F
14.7.23.10

Rising Antivirus
PE:Malware.Obscure!1.9C59
23.00.65.14721

File size:
7.8 MB (8,186,696 bytes)

File type:
Executable application (Win32 EXE)

Installer:
Nullsoft Install System

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\setup.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
6/23/2014 2:00:00 AM

Valid to:
6/24/2015 1:59:59 AM

Subject:
CN=Robokid Technologies, O=Robokid Technologies, STREET=Athinodorou 3 Dasoupoli Strovolos, L=Nicosia, S=Cyprus, PostalCode=2025, C=CY

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00ECF35E880AD0F3BC6F82DFB1F2E84CC0

File PE Metadata
Compilation timestamp:
12/4/2012 2:55:02 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.22

CTPH (ssdeep):
196608:xkp93lCBry0Ym1u75V9zXm7xLTuxf0ppK/GCBaTELV2F:eL34BNU75u75Ch2dao

Entry address:
0x4323

Entry point:
55, 89, E5, 57, 56, 53, 81, EC, AC, 01, 00, 00, FF, 15, 74, C3, 44, 00, C7, 04, 24, 01, 80, 00, 00, FF, 15, 58, C4, 44, 00, 53, C7, 04, 24, 00, 00, 00, 00, FF, 15, 98, C4, 44, 00, 56, A3, 40, 3B, 44, 00, C7, 04, 24, 08, 00, 00, 00, E8, 8D, 3B, 00, 00, A3, 9C, 3B, 44, 00, 8D, 85, 84, FE, FF, FF, 57, C7, 44, 24, 10, 00, 00, 00, 00, C7, 44, 24, 0C, 60, 01, 00, 00, 89, 44, 24, 08, C7, 44, 24, 04, 00, 00, 00, 00, C7, 04, 24, 01, B3, 40, 00, FF, 15, AC, C4, 44, 00, 83, EC, 14, C7, 44, 24, 04, 02, B3, 40, 00, C7...
 
[+]

Code size:
34.5 KB (35,328 bytes)

Remove setup.exe - Powered by Reason Core Security