etypesetup_v1.0.1.6443.exe

DSNR Media Group

The application etypesetup_v1.0.1.6443.exe by DSNR Media Group has been detected as adware by 7 anti-malware scanners. It uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. The file has been seen being downloaded from version.etype.com.
Publisher:
DSNR Media Group  (signed and verified)

MD5:
c54554b8d2cc5ce7a197277b3407b3ec

SHA-1:
2cddb934bdf95999b35115a07a677a31017a5a1f

SHA-256:
c10a1e578d01c50b71515b00974ae88e5b9be87899708564cd2bf5fdaf727606

Scanner detections:
7 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Analysis date:
1/14/2025 2:48:49 PM UTC  (today)

Scan engine
Detection
Engine version

Dr.Web
Adware.InstallCore.80
9.0.1.05190

ESET NOD32
Win32/InstallCore.AZ potentially unwanted application
8.0.319.0

F-Prot
W32/InstallCore.S.gen
4.6.5.141

McAfee
Trojan.GenericR-DDJ!C54554B8D2CC
18.0.204.0

Microsoft Security Essentials
Threat.Undefined
1.213.6622.0

Reason Heuristics
PUP.DSNR.DSNRMediaGroup.Installer (M)
16.2.19.7

VIPRE Antivirus
Threat.4150696
47238

File size:
1.1 MB (1,193,800 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\downloads\etypesetup_v1.0.1.6443.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
2/4/2013 12:00:00 AM

Valid to:
2/4/2014 11:59:59 PM

Subject:
CN=DSNR Media Group, OU=IT, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=DSNR Media Group, L=Raanana, S=Israel, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
728AB12B430CC198ECD6CC4C4790F216

File PE Metadata
Compilation timestamp:
6/20/1992 3:52:17 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
24576:kTDL7vaRF9NpvNXU0x0K31gWGWFSGrGGJ:ivrtf0WQSwG

Entry address:
0xDA070

Entry point:
55, 8B, EC, 83, C4, F0, B8, F0, 6E, 41, 00, E8, EE, FA, FF, FF, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
6.7091

Developed / compiled with:
Microsoft Visual C++

Code size:
885 KB (906,240 bytes)

The file etypesetup_v1.0.1.6443.exe has been seen being distributed by the following URL.

Remove etypesetup_v1.0.1.6443.exe - Powered by Reason Core Security