setup.exe

Tuguu SLU

The Tuguu download and install manager uses the DomalIQ installer to bundle additional adware offers such as toolbars and browser extensions during the setup process. This software distributes modified installers which are not the same as the original distributed by the author. The application setup.exe by Tuguu SLU has been detected as adware by 35 anti-malware scanners. The program is a setup application that uses the TUGUU DomaIQ Setup installer. During install, it bundles potentially unwanted software on a user's computer at the same time without adequate consent.
Publisher:
Tuguu SLU  (signed and verified)

MD5:
1f8701b79c5858ee9c941808e8d89a7e

SHA-1:
54d61fb4f70760b4a54e4ca2b9673547042b6328

SHA-256:
35e7e2dd3c7feadc71692a6fb9dde7c2baebdb1ca47aabf1eded93c1f2ae5dee

Scanner detections:
35 / 68

Status:
Adware

Explanation:
Uses the DomainIQ download manager to bundle additional potentially unwanted software without adequate consent.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/26/2024 10:51:31 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Dropped:Application.Bundler.DomaIQ.Q
691

Agnitum Outpost
Adware.Agent
7.1.1

AhnLab V3 Security
Malware/Win32.Generic
2015.03.16

Avira AntiVirus
PUA/DomaIQ.Gen
7.11.217.124

avast!
PUP-gen [PUP]
2014.9-150315

AVG
Adware Skodna.Bundle_r.P
2014.0.4257

Bitdefender
Dropped:Application.Bundler.DomaIQ.Q
1.0.20.370

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Trojan.Domaiq-64
0.98/20194

Comodo Security
Application.Win32.DomaIQ.JIK
21422

Dr.Web
Trojan.PayInt.1
9.0.1.074

Emsisoft Anti-Malware
Dropped:Application.Bundler.DomaIQ.Q
8.15.03.15.01

ESET NOD32
Win32/DomaIQ.AN potentially unwanted application
9.7.0.302.0

Fortinet FortiGate
W32/DomaIQ.AN!tr
3/15/2015

F-Prot
W32/MSIL_Troj.CL2.gen
v6.4.6.5.141

F-Secure
Riskware.Dropped:Application.Bundler.DomaIQ
11.2015-15-03_1

G Data
Dropped:Application.Bundler.DomaIQ
15.3.25

herdProtect (fuzzy)
2015.6.21.14

IKARUS anti.virus
PUA.MSIL.DomaIQ
t3scan.1.8.6.0

K7 AntiVirus
Unwanted-Program
13.200.15263

Kaspersky
not-a-virus:AdWare.Win32.DomaIQ
15.0.0.543

Malwarebytes
PUP.Optional.BundleInstaller.A
v2015.03.15.02

McAfee
Program.CryptDomaIQ
5600.6825

MicroWorld eScan
Dropped:Application.Bundler.DomaIQ.Q
16.0.0.222

NANO AntiVirus
Trojan.Win32.PayInt.cqkalc
0.30.0.296

Norman
Dropped:Trojan.Generic.10073764
11.20150315

nProtect
Trojan-Clicker/W32.DomaIQ.461744
15.03.13.01

Panda Antivirus
PUP/MultiToolbar.A
15.03.15.02

Quick Heal
Adware.DomaIQ.BT5
3.15.14.00

Reason Heuristics
PUP.Bundler.Tuguu
15.3.15.13

Rising Antivirus
PE:PUF.DomaIQ!1.9EEB
23.00.65.15313

Sophos
PUA 'DomainIQ pay-per install'
5.12

Vba32 AntiVirus
OScope.Downware.DomaIQ
3.12.26.3

VIPRE Antivirus
Threat.4150696
38050

Zillya! Antivirus
Adware.DomaIQ.Win32.169
2.0.0.2100

File size:
450.9 KB (461,744 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
TUGUU DomaIQ Setup

Common path:
C:\users\{user}\downloads\setup.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
2/7/2013 7:00:00 PM

Valid to:
2/8/2014 6:59:59 PM

Subject:
CN=Tuguu SLU, OU=N/A, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Tuguu SLU, L=Adeje, S=Santa Cruz de Tenrife, C=ES

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
552127982028C352ADDA5CA8F6C0BAE7

File PE Metadata
Compilation timestamp:
11/29/2013 11:13:40 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
6144:EOoM2iSrUT2nTNtY/ccTDtpzQJ953zfjbBagEJdzfIzNJ+xTRUkUkhLY6:5mnTNtY/zDA53bGJdD6J+xFUts

Entry address:
0xD74B

Entry point:
E8, 99, 59, 00, 00, E9, 78, FE, FF, FF, 6A, 0C, 68, 90, 35, 42, 00, E8, EB, 22, 00, 00, 83, 65, E4, 00, 8B, 75, 08, 3B, 35, 70, A8, 42, 00, 77, 22, 6A, 04, E8, 84, 5B, 00, 00, 59, 83, 65, FC, 00, 56, E8, 8B, 63, 00, 00, 59, 89, 45, E4, C7, 45, FC, FE, FF, FF, FF, E8, 09, 00, 00, 00, 8B, 45, E4, E8, F7, 22, 00, 00, C3, 6A, 04, E8, 7F, 5A, 00, 00, 59, C3, 8B, FF, 55, 8B, EC, 56, 8B, 75, 08, 83, FE, E0, 0F, 87, A1, 00, 00, 00, 53, 57, 8B, 3D, A8, E0, 41, 00, 83, 3D, 1C, 95, 42, 00, 00, 75, 18, E8, 4B, 51, 00...
 
[+]

Entropy:
7.3908

Code size:
114 KB (116,736 bytes)

The file setup.exe has been seen being distributed by the following 2 URLs.

Remove setup.exe - Powered by Reason Core Security