Setup.exe

Code Techno

The file Setup.exe by Code Techno has been detected as a potentially unwanted program by 26 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. This downloadble file is typically blocked through Google's Safe Browsing technology in Chrome web browser. The file has been seen being downloaded from clk1005.com.
Publisher:
Code Techno  (signed and verified)

MD5:
51820ce05add50da8e786937206e864a

SHA-1:
ee63642507a9cf79164809902aa1b0a8332510b1

SHA-256:
eebc2010a9a64c9942dfdd56d7ff341038cee88948a3a60a155f22aafca2be65

Scanner detections:
26 / 68

Status:
Potentially unwanted

Analysis date:
4/26/2024 1:27:48 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Downloader.UY
623

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
PUP/Win32.Downware
2015.01.23

Avira AntiVirus
ADWARE/Adware.Gen
7.11.204.50

AVG
Generic
2016.0.3101

Bitdefender
Application.Downloader.UY
1.0.20.715

Clam AntiVirus
Win.Adware.Downloadadmin
0.98/21511

Comodo Security
Application.Win32.DownloadAdmin.ANGL
20805

Dr.Web
Adware.Downware.2220
9.0.1.0143

ESET NOD32
Win32/DownloadAdmin (variant)
9.11056

F-Prot
W32/S-b3398882
v6.4.7.1.166

F-Secure
Application.Downloader.UY
11.2015-23-05_7

G Data
Application.Downloader.UY
15.5.24

K7 AntiVirus
Unwanted-Program
13.191.14723

Kaspersky
not-a-virus:Downloader.Win32.Agent
14.0.0.1998

Malwarebytes
PUP.Optional.DownloadAdmin
v2015.05.23.10

McAfee
Artemis!51820CE05ADD
5600.6757

MicroWorld eScan
Application.Downloader.UY
16.0.0.429

NANO AntiVirus
Riskware.Win32.Downware.djahkt
0.30.0.64812

Panda Antivirus
Generic Suspicious
15.05.23.10

Qihoo 360 Security
Win32/Application.Downloader.c76
1.0.0.1015

Reason Heuristics
PUP.Installer.CodeTechno
15.5.23.6

Sophos
Generic PUA OO
4.98

Vba32 AntiVirus
Downloader.Agent
3.12.26.3

VIPRE Antivirus
Trojan.Win32.Generic
36882

Zillya! Antivirus
Downloader.Agent.Win32.230169
2.0.0.2042

File size:
821.9 KB (841,664 bytes)

Installer:
NSIS (Nullsoft Scriptable Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\setup.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
2/26/2014 1:00:00 AM

Valid to:
2/26/2017 12:59:59 AM

Subject:
CN=Code Techno, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Code Techno, L=SAN FRANCISCO, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
57F2A4C1987266C5627CFFB542729A0B

File PE Metadata
Compilation timestamp:
7/15/2014 6:29:31 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:txpJfslZtuaVd9lpmhwQbift489IVGD4xJFl6Xqb5Kbmkg8SU:fp9sVuaVdvgVbmgGDijyikg5U

Entry address:
0x3345

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, B0, 73, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, C0, 70, 40, 00, 53, FF, 15, 88, 72, 40, 00, 6A, 08, A3, B8, 3C, 42, 00, E8, 2E, 25, 00, 00, 53, 68, 60, 01, 00, 00, A3, C0, 3B, 42, 00, 8D, 44, 24, 38, 50, 53, 68, 43, 74, 40, 00, FF, 15, 64, 71, 40, 00, 68, 38, 74, 40, 00, 68, C0, 33, 42, 00, E8, 1F, 24, 00, 00, FF, 15, BC, 70, 40, 00, 50, BF, 00, 90, 42, 00, 57, E8, 0D, 24, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The file Setup.exe has been seen being distributed by the following URL.

http://clk1005.com/.../sa?cid=KINOXPOPS&pid=&q=game of thrones

Remove Setup.exe - Powered by Reason Core Security