player_setup.exe

Tuguu SLU

The Tuguu download and install manager uses the DomalIQ installer to bundle additional adware offers such as toolbars and browser extensions during the setup process. This software distributes modified installers which are not the same as the original distributed by the author. The application player_setup.exe by Tuguu SLU has been detected as adware by 30 anti-malware scanners. The program is a setup application that uses the TUGUU DomaIQ Setup installer. During install, it bundles potentially unwanted software on a user's computer at the same time without adequate consent.
Publisher:
Tuguu SLU  (signed and verified)

MD5:
21a6e54a98482a87683bc72ea286acf4

SHA-1:
83b25d0a665e2a6927290a89ac7c1ad5ee2064d8

SHA-256:
e8f8f41b0819f896dfcc6aaa4ccecf3da7a32350a70b8d1dc5b6195d6789c74b

Scanner detections:
30 / 68

Status:
Adware

Explanation:
Uses the DomainIQ download manager to bundle additional potentially unwanted software without adequate consent.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
4/19/2024 11:30:43 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Dropped:Trojan.Generic.10073764
1001

Agnitum Outpost
Adware.Agent
7.1.1

AhnLab V3 Security
Malware/Win32.Generic
14.05.09

Avira AntiVirus
APPL/DomaIQ.AB
7.11.148.200

avast!
Win32:DomaIQ-AG [PUP]
2014.9-140509

AVG
Skodna.Bundle_r.P
2015.0.3479

Bitdefender
Dropped:Trojan.Generic.10073764
1.0.20.645

Comodo Security
Application.Win32.DomaIQ.JIK
18245

Dr.Web
Trojan.PayInt.1
9.0.1.0129

Emsisoft Anti-Malware
Dropped:Trojan.Generic.10073764
8.14.05.09.08

ESET NOD32
Win32/DomaIQ.AN (variant)
8.9780

Fortinet FortiGate
W32/DomaIQ.AN!tr
5/9/2014

F-Prot
W32/DomaIQ.B.gen
v6.4.7.1.166

F-Secure
Dropped:Trojan.Generic.10073764
11.2014-09-05_6

G Data
Dropped:Trojan.Generic.10073764
14.5.24

IKARUS anti.virus
Trojan.SuspectCRC
t3scan.1.6.1.0

K7 AntiVirus
Trojan
13.177.12041

Kaspersky
not-a-virus:AdWare.Win32.DomaIQ
14.0.0.3891

Malwarebytes
PUP.Optional.BundleInstaller.A
v2014.05.09.08

McAfee
RDN/Generic.bfr!fj
5600.7135

MicroWorld eScan
Dropped:Trojan.Generic.10073764
15.0.0.387

NANO AntiVirus
Trojan.Win32.PayInt.cqkalc
0.28.0.59608

Panda Antivirus
PUP/MultiToolbar.A
14.05.09.08

Qihoo 360 Security
Malware.QVM06.Gen
1.0.0.1015

Reason Heuristics
PUP.Installer.TuguuSLU.M
14.8.7.21

Rising Antivirus
PE:PUF.DomaIQ!1.9EEB
23.00.65.14507

Sophos
DomainIQ pay-per install
4.98

Vba32 AntiVirus
OScope.Downware.DomaIQ
3.12.26.0

VIPRE Antivirus
Trojan.Win32.Generic
29036

Zillya! Antivirus
Adware.DomaIQ.Win32.169
2.0.0.1783

File size:
450.9 KB (461,752 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
TUGUU DomaIQ Setup

Common path:
C:\users\{user}\downloads\player_setup.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
2/7/2013 6:00:00 PM

Valid to:
2/8/2014 5:59:59 PM

Subject:
CN=Tuguu SLU, OU=N/A, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Tuguu SLU, L=Adeje, S=Santa Cruz de Tenrife, C=ES

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
552127982028C352ADDA5CA8F6C0BAE7

File PE Metadata
Compilation timestamp:
11/29/2013 10:13:40 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
6144:cOoM2iSrUT2nTNtY/ccTDtpzQJ953zfjbBagEJdzfIzNJ+xTRUkUkhLYB9:xmnTNtY/zDA53bGJdD6J+xFUt/9

Entry address:
0xD74B

Entry point:
E8, 99, 59, 00, 00, E9, 78, FE, FF, FF, 6A, 0C, 68, 90, 35, 42, 00, E8, EB, 22, 00, 00, 83, 65, E4, 00, 8B, 75, 08, 3B, 35, 70, A8, 42, 00, 77, 22, 6A, 04, E8, 84, 5B, 00, 00, 59, 83, 65, FC, 00, 56, E8, 8B, 63, 00, 00, 59, 89, 45, E4, C7, 45, FC, FE, FF, FF, FF, E8, 09, 00, 00, 00, 8B, 45, E4, E8, F7, 22, 00, 00, C3, 6A, 04, E8, 7F, 5A, 00, 00, 59, C3, 8B, FF, 55, 8B, EC, 56, 8B, 75, 08, 83, FE, E0, 0F, 87, A1, 00, 00, 00, 53, 57, 8B, 3D, A8, E0, 41, 00, 83, 3D, 1C, 95, 42, 00, 00, 75, 18, E8, 4B, 51, 00...
 
[+]

Entropy:
7.3908

Code size:
114 KB (116,736 bytes)

The file player_setup.exe has been seen being distributed by the following URL.

Remove player_setup.exe - Powered by Reason Core Security