parent.txt

Payments Interactive SL

This is the Tuguu DomaIQ download manager which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The file parent.txt by Payments Interactive SL has been detected as adware by 32 anti-malware scanners. The program is a setup application that uses the TUGUU DomaIQ Setup installer. During install, it bundles potentially unwanted software on a user's computer at the same time without adequate consent. It is also typically executed from the user's temporary directory.
Publisher:
Payments Interactive SL  (signed and verified)

MD5:
71e94d9d731fdf0c9bb97b3bccec17f4

SHA-1:
03b067fd2ab7776fbdf01bc348d68d8c6a53d4de

SHA-256:
eb61fe2924017155a326c6520520fd9cdcbdb7796580f244e6ff8bd449bd76d1

Scanner detections:
32 / 68

Status:
Adware

Explanation:
Uses the DomainIQ download manager to bundle additional potentially unwanted software without adequate consent.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/19/2024 8:00:16 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Dropped:Adware.DomaIQ.R
868

Agnitum Outpost
PUA.DomaIQ
7.1.1

AhnLab V3 Security
PUP/Win32.DomaIQ
2014.08.28

Avira AntiVirus
APPL/DomaIQ.Gen2
7.11.169.166

avast!
Win32:DomaIQ-CM [PUP]
2014.9-140919

AVG
Adware Skodna.Generic_r
2015.0.3346

Bitdefender
Dropped:Adware.DomaIQ.R
1.0.20.1310

Clam AntiVirus
Win.Adware.Domaiq-34
0.98/19312

Comodo Security
Application.Win32.Agent.D
19340

Dr.Web
Adware.Downware.1827
9.0.1.0262

Emsisoft Anti-Malware
Dropped:Adware.DomaIQ.R
8.14.09.19.08

ESET NOD32
Win32/DomaIQ.AT potentially unwanted application
8.7.0.302.0

F-Prot
W32/DomaIQ.B.gen
v6.4.7.1.166

F-Secure
Adware:W32/DomaIQ
11.2014-19-09_6

G Data
Dropped:Adware.DomaIQ
14.9.24

herdProtect (fuzzy)
2014.11.30.11

IKARUS anti.virus
AdWare.DomaIQ
t3scan.1.7.5.0

K7 AntiVirus
Unwanted-Program
13.183.13166

Kaspersky
not-a-virus:AdWare.MSIL.DomaIQ
14.0.0.3225

Malwarebytes
PUP.Optional.BundleInstaller.A
v2014.09.19.10

McAfee
Adware-DomaIQ
5600.7002

MicroWorld eScan
Dropped:Adware.DomaIQ.R
15.0.0.786

NANO AntiVirus
Riskware.Win32.DomaIQ.crviun
0.28.2.61861

nProtect
Trojan-Clicker/W32.Agent.471600.B
14.08.28.01

Panda Antivirus
PUP/MultiToolbar.A
14.09.19.10

Quick Heal
Adware.Domal.A5
9.14.14.00

Reason Heuristics
PUP.PaymentsInteractiveSL.J
14.9.19.20

Rising Antivirus
PE:PUF.DomaIQ!1.9EEB
23.00.65.14917

Sophos
DomainIQ pay-per install
4.98

Vba32 AntiVirus
BScope.Downware.DomaIQ
3.12.26.3

VIPRE Antivirus
Threat.4150696
32210

Zillya! Antivirus
Adware.Lollipop.Win32.114
2.0.0.1905

File size:
460.5 KB (471,560 bytes)

Bundler/Installer:
TUGUU DomaIQ Setup

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\parent.txt

Digital Signature
Authority:
DigiCert Inc

Valid from:
11/21/2013 11:00:00 AM

Valid to:
11/26/2014 11:00:00 PM

Subject:
CN=Payments Interactive SL, O=Payments Interactive SL, L=Puntagorda, S=Santa Cruz de Tenerife, C=ES

Issuer:
CN=DigiCert Assured ID Code Signing CA-1, OU=www.digicert.com, O=DigiCert Inc, C=US

Serial number:
0C53B3385E2DD3F89A0D1CFE9C0E443C

File PE Metadata
Compilation timestamp:
12/22/2013 8:55:28 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
6144:yXP2VguYIgrGRq6t2BfkXws/ZDNmSEk/UnOJtxw051M6Jp/+hTg8cdlbv6xYl:AkgrL6qMgs/NNSksnOfx55/aG6A

Entry address:
0xD685

Entry point:
E8, 34, 63, 00, 00, E9, 78, FE, FF, FF, 6A, 0C, 68, C8, 53, 42, 00, E8, 2D, 04, 00, 00, 83, 65, E4, 00, 8B, 75, 08, 3B, 35, 50, B8, 42, 00, 77, 22, 6A, 04, E8, 1F, 65, 00, 00, 59, 83, 65, FC, 00, 56, E8, 26, 6D, 00, 00, 59, 89, 45, E4, C7, 45, FC, FE, FF, FF, FF, E8, 09, 00, 00, 00, 8B, 45, E4, E8, 39, 04, 00, 00, C3, 6A, 04, E8, 1A, 64, 00, 00, 59, C3, 8B, FF, 55, 8B, EC, 56, 8B, 75, 08, 83, FE, E0, 0F, 87, A1, 00, 00, 00, 53, 57, 8B, 3D, 70, 00, 42, 00, 83, 3D, 14, B5, 42, 00, 00, 75, 18, E8, DA, 5B, 00...
 
[+]

Entropy:
7.4124

Code size:
121 KB (123,904 bytes)

Remove parent.txt - Powered by Reason Core Security