setup.exe

Search Protect

ClientConnect LTD

The file belongs to the ClientConnect (Conduit/Perion) platform, a utility that bundles and monetizes search toolbars and browser add-ons. The application setup.exe by ClientConnect has been detected as adware by 30 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. The file has been seen being downloaded from sp-storage.spccint.com and multiple other hosts.
Publisher:
Client Connect LTD  (signed by ClientConnect LTD)

Product:
Search Protect

Version:
3.0.200.15

MD5:
bc9673923408abe5ac9afaa75322c10c

SHA-1:
2c0efff92c72280b1e2259986739161f16be6900

SHA-256:
9137b4cb8829ccad381393c3dfa0890215d0e7dc2cf0488e0855903600fd492f

Scanner detections:
30 / 68

Status:
Adware

Explanation:
Bundles the Conduit Toolbar and/or Conduit Search Protect.

Analysis date:
12/4/2024 7:54:29 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Application.Kazy.579830
407

Agnitum Outpost
Riskware.SearchProtect
7.1.1

AhnLab V3 Security
PUP/Win32.SearchProtect
2015.07.03

avast!
Win32:Conduit-B [PUP]
2014.9-151224

AVG
Generic
2016.0.2885

Baidu Antivirus
Adware.Win32.Conduit
4.0.3.151224

Bitdefender
Adware.SearchProtect.AE
1.0.20.1790

Bkav FE
W32.HfsAdware
1.3.0.6979

Dr.Web
Adware.Conduit.298
9.0.1.0358

Emsisoft Anti-Malware
Adware.SearchProtect.X
8.15.12.24.06

ESET NOD32
Win32/ClientConnect.A potentially unwanted (variant)
9.11881

Fortinet FortiGate
Riskware/Conduit_SearchProtect
12/24/2015

F-Prot
W32/S-d4ed2314
v6.4.7.1.166

F-Secure
Gen:Variant.Application.Kazy
11.2015-24-12_5

G Data
Win32.Application.SearchProtect.AA@gen
15.12.25

IKARUS anti.virus
PUA.ClientConnect
t3scan.1.8.6.0

K7 AntiVirus
Unwanted-Program
13.205.16443

Malwarebytes
PUP.Optional.SearchProtect.A
v2015.12.24.06

McAfee
Artemis!B7A01C0006F3
5600.6541

MicroWorld eScan
Gen:Variant.Application.Kazy.579830
16.0.0.1074

NANO AntiVirus
Riskware.Nsis.Adware.dpmadi
0.30.24.2320

Panda Antivirus
PUP/SearchProtect
15.12.24.06

Qihoo 360 Security
HEUR/QVM42.1.Malware.Gen
1.0.0.1015

Quick Heal
PUA.Clientconn.Gen
12.15.14.00

Reason Heuristics
PUP.Conduit.ClientConnect.Installer (M)
15.12.24.18

Sophos
Conduit Search Protect
4.98

Trend Micro House Call
PUA_SPROTECT
7.2.358

Trend Micro
PUA_SPROTECT
10.465.24

VIPRE Antivirus
Conduit
41660

Zillya! Antivirus
Trojan.Black.Win32.31985
2.0.0.2164

File size:
8.6 MB (9,064,584 bytes)

Product version:
3.0.200.15

Copyright:
© 2014 ClientConnect Ltd.

Original file name:
SearchProtect

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\appdata\local\microsoft\windows\inetcache\content.ie5\v8xcalex\setup.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
12/31/2014 1:00:00 AM

Valid to:
12/27/2016 12:59:59 AM

Subject:
CN=ClientConnect LTD, OU=Safe Search, O=ClientConnect LTD, L=Ness Ziona, S=Israel, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
354F4C7E49A131A6E4BF89B253C78A2D

File PE Metadata
Compilation timestamp:
7/6/2011 4:31:20 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
98304:0HIgYyVTCnZ0tOwCOn44DAQ0rHNPWmrDMOA0bex6s7DGqMXipHXKeaimAsEnpThv:0pYd3jKDWrtRDMOtbw6SDzpajnEY00PA

Entry address:
0x354B

Entry point:
81, EC, D4, 02, 00, 00, 53, 55, 56, 57, 6A, 20, 33, ED, 5E, 89, 6C, 24, 18, C7, 44, 24, 10, D8, 84, 40, 00, 89, 6C, 24, 14, FF, 15, 30, 80, 40, 00, 68, 01, 80, 00, 00, FF, 15, B8, 80, 40, 00, 55, FF, 15, B0, 82, 40, 00, 6A, 08, A3, 98, 06, 47, 00, E8, 67, 27, 00, 00, 55, 68, B4, 02, 00, 00, A3, B0, 05, 47, 00, 8D, 44, 24, 38, 50, 55, 68, 1C, 86, 40, 00, FF, 15, 80, 81, 40, 00, 68, 04, 86, 40, 00, 68, A0, 85, 46, 00, E8, 35, 26, 00, 00, FF, 15, B4, 80, 40, 00, 50, BF, A0, 10, 4C, 00, 57, E8, 23, 26, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
25 KB (25,600 bytes)

The file setup.exe has been seen being distributed by the following 5 URLs.

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to a184-29-252-78.deploy.static.akamaitechnologies.com  (184.29.252.78:80)

TCP (HTTP):
Connects to ec2-54-225-182-66.compute-1.amazonaws.com  (54.225.182.66:80)

TCP (HTTP):
Connects to a23-196-119-214.deploy.static.akamaitechnologies.com  (23.196.119.214:80)

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):
Connects to a172-227-95-183.deploy.static.akamaitechnologies.com  (172.227.95.183:80)

TCP (HTTP):
Connects to ec2-23-23-99-139.compute-1.amazonaws.com  (23.23.99.139:80)

TCP (HTTP):

TCP (HTTP):
Connects to a23-214-155-116.deploy.static.akamaitechnologies.com  (23.214.155.116:80)

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):
Connects to a184-31-73-134.deploy.static.akamaitechnologies.com  (184.31.73.134:80)

TCP (HTTP):
Connects to a173-223-169-93.deploy.static.akamaitechnologies.com  (173.223.169.93:80)

TCP (HTTP):
Connects to a104-90-105-31.deploy.static.akamaitechnologies.com  (104.90.105.31:80)

Remove setup.exe - Powered by Reason Core Security