veohwebplayersetup_eng.exe

Qlipso Inc.

The application veohwebplayersetup_eng.exe by Qlipso has been detected as a potentially unwanted program by 10 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. The installer uses the OpenCandy monitzation platform which will donwload and install offers in the setup for potentially unwanted software including ad/search-supported toolbars. The file has been seen being downloaded from ll-appserver.veoh.com.
Publisher:
Qlipso Inc.  (signed and verified)

MD5:
cf869216ca81e176e80a4c554745c37f

SHA-1:
4b14ec4571fa82d60b76b461b2bd2c033e8563ef

SHA-256:
645ff7d1b800ee631431b2739823fae154263543b133acc57736a35001b0adb7

Scanner detections:
10 / 68

Status:
Potentially unwanted

Explanation:
Packages the OpenCandy software bundler that offers to install additional software and may include web browser add-ons and toolbars which display advertising (based on publisher settings and geo context).

Analysis date:
4/26/2024 9:28:59 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.Toolbar
7.1.1

Comodo Security
UnclassifiedMalware
18458

Dr.Web
Adware.Zugo.71
9.0.1.035

ESET NOD32
9.9906

Fortinet FortiGate
Riskware/Toolbar
2/4/2015

Malwarebytes
PUP.Optional.OpenCandy
v2015.02.04.01

McAfee
Artemis!CF869216CA81
5600.6864

Rising Antivirus
PE:Trojan.Win32.Generic.1287BA48!310884936
23.00.65.15202

Trend Micro House Call
ADW_ZUGO
7.2.35

Trend Micro
ADW_ZUGO
10.465.04

File size:
14.1 MB (14,739,696 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\downloads\veohwebplayersetup_eng.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
5/25/2011 8:00:00 AM

Valid to:
5/25/2012 7:59:59 AM

Subject:
CN=Qlipso Inc., OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Qlipso Inc., L=Santa Monica, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
087E17D7B2CA0D412673C947F2D84BDD

File PE Metadata
Compilation timestamp:
12/6/2009 6:50:41 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
393216:75K4VQ5bwxGtVPVi3uzahRohFBq+b2U5CvH2yR3RB:75LNM40aTwFBPjCOuB

Entry address:
0x30CB

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 38, 3F, 42, 00, E8, F1, 2B, 00, 00, A3, 84, 3E, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 30, F4, 41, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 80, 36, 42, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 90, 42, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Entropy:
7.9999

Packer / compiler:
Nullsoft install system v2.x

Code size:
22.5 KB (23,040 bytes)

The file veohwebplayersetup_eng.exe has been seen being distributed by the following URL.

Remove veohwebplayersetup_eng.exe - Powered by Reason Core Security