setup.exe

ClickMeIn Limited

The installer utilizes the installCore download manager which may bundle additional offers for various ad-supported toolbars, extensions and utilities. The application setup.exe by ClickMeIn Limited has been detected as adware by 5 anti-malware scanners. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. The file has been seen being downloaded from www.download-servers.com.
Publisher:
ClickMeIn Limited  (signed and verified)

MD5:
63bfd638f7fe8484c137a7ae91b62080

SHA-1:
851c8be6b029edf880b8b157e542b9de9b00c94a

SHA-256:
4b0691de37ca13119e33ed884585639364e72c795e99ecd9bd905646169619b5

Scanner detections:
5 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/26/2024 8:44:36 AM UTC  (today)

Scan engine
Detection
Engine version

Dr.Web
Adware.InstallCore.110
9.0.1.0347

Malwarebytes
v2013.12.13.03

Reason Heuristics
PUP.Installer.ClickMeInLimited.F
14.3.1.4

Rising Antivirus
PE:Malware.XPACK-LNR/Heur!1.5594
23.00.65.131211

Trend Micro House Call
TROJ_GEN.F47V1209
7.2.347

File size:
563 KB (576,544 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Common path:
C:\users\{user}\downloads\setup.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
1/12/2012 1:00:00 AM

Valid to:
3/3/2015 12:59:59 AM

Subject:
CN=ClickMeIn Limited, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=ClickMeIn Limited, L=Nicosia, S=Nicosia, C=CY

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
0181B78FA98E62B38390017BFFA25E8C

File PE Metadata
Compilation timestamp:
6/20/1992 12:22:17 AM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:hyMJfsGiEqc3XEWtOvZvpZvgrB7hDojEY487riE4oFAu7+3MFIS1nFkblZYHUBqA:hyMJfsZE/3UaOvZvzYr8jEkiE4Gt75Fg

Entry address:
0x98CC

Entry point:
55, 8B, EC, 83, C4, CC, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, FA, 97, FF, FF, E8, 01, AA, FF, FF, E8, 2C, CC, FF, FF, E8, 73, CC, FF, FF, E8, 0A, F3, FF, FF, E8, 71, F4, FF, FF, 33, C0, 55, 68, 76, 9F, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, 2C, 9F, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, B0, 40, 00, E8, 9B, FE, FF, FF, E8, 26, FA, FF, FF, 8D, 55, F0, 33, C0, E8, E0, D0, FF, FF, 8B, 55, F0, B8, D8, BD, 40, 00, E8, AB, 98, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, D8, BD, 40, 00, B2, 01, B8...
 
[+]

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
36 KB (36,864 bytes)

The file setup.exe has been seen being distributed by the following URL.

Remove setup.exe - Powered by Reason Core Security