veohwebplayersetup_eng.exe

Veoh Networks

The application veohwebplayersetup_eng.exe by Veoh Networks has been detected as a potentially unwanted program by 3 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. The installer uses the OpenCandy monitzation platform which will donwload and install offers in the setup for potentially unwanted software including ad/search-supported toolbars. The file has been seen being downloaded from ll-appserver.veoh.com.
Publisher:
Veoh Networks  (signed and verified)

MD5:
84b0c489474b51bc1f849a361bb3c39e

SHA-1:
294ab91288412decb27232655add82faf0b1c55d

SHA-256:
918ffaf631b96ca9045ed42d3f546a138ffd2a96c45012086adf37077906f0cb

Scanner detections:
3 / 68

Status:
Potentially unwanted

Explanation:
Packages the OpenCandy software bundler that offers to install additional software and may include web browser add-ons and toolbars which display advertising (based on publisher settings and geo context).

Analysis date:
4/25/2024 9:46:10 PM UTC  (today)

Scan engine
Detection
Engine version

ESET NOD32
8.9190

Fortinet FortiGate
Adware/OpenCandy
5/6/2014

Reason Heuristics
PUP.OpenCandy.Installer (L)
16.11.29.22

File size:
12.4 MB (12,958,736 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\downloads\veohwebplayersetup_eng.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
5/27/2010 5:00:00 PM

Valid to:
5/27/2011 4:59:59 PM

Subject:
CN=Veoh Networks, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Veoh Networks, L=San Diego, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2009-2 CA, OU=Terms of use at https://www.verisign.com/rpa (c)09, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
310D056AC88024A33366577B5237D5F8

File PE Metadata
Compilation timestamp:
12/5/2009 2:50:41 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
196608:GOgGcOwmUhcDERUB7LxzA86NIE8IwzCS2F30ax6XnYP8KGIJhLDJ9b5736/xgG:8+wmUhDUV1OIlI029PQvIJZJ913Mxf

Entry address:
0x30CB

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 38, 3F, 42, 00, E8, F1, 2B, 00, 00, A3, 84, 3E, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 30, F4, 41, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 80, 36, 42, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 90, 42, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Entropy:
7.9996

Packer / compiler:
Nullsoft install system v2.x

Code size:
22.5 KB (23,040 bytes)

The file veohwebplayersetup_eng.exe has been seen being distributed by the following URL.

Remove veohwebplayersetup_eng.exe - Powered by Reason Core Security