veohwebplayersetup_eng.exe

Qlipso Inc.

The application veohwebplayersetup_eng.exe by Qlipso has been detected as a potentially unwanted program by 6 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. The installer uses the OpenCandy monitzation platform which will donwload and install offers in the setup for potentially unwanted software including ad/search-supported toolbars. The file has been seen being downloaded from ll-appserver.veoh.com.
Publisher:
Qlipso Inc.  (signed and verified)

MD5:
3b514b00464d0fe8cecd39adc58912a3

SHA-1:
e90e09b9e2e71f11021055bb64e1ae4ddd65a5d5

Scanner detections:
6 / 68

Status:
Potentially unwanted

Explanation:
Packages the OpenCandy software bundler that offers to install additional software and may include web browser add-ons and toolbars which display advertising (based on publisher settings and geo context).

Analysis date:
4/26/2024 7:50:25 AM UTC  (today)

Scan engine
Detection
Engine version

Dr.Web
Trojan.DownLoader5.32572
9.0.1.0102

ESET NOD32
8.9070

Fortinet FortiGate
Adware/Zugo
4/12/2014

Malwarebytes
PUP.Optional.OpenCandy
v2014.04.12.11

Rising Antivirus
Trojan.Win32.Generic.1287BA48
23.00.65.14410

Trend Micro House Call
TROJ_GEN.F47V0507
7.2.102

File size:
19 MB (19,963,496 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
5/25/2011 2:00:00 AM

Valid to:
5/25/2012 1:59:59 AM

Subject:
CN=Qlipso Inc., OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Qlipso Inc., L=Santa Monica, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
087E17D7B2CA0D412673C947F2D84BDD

File PE Metadata
Compilation timestamp:
12/5/2009 11:50:41 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
393216:75RfO43nSPB4uXRRWMi3uzahRohFBq+b2U5CvH2yR3Rh:vO4iPB4uXzs0aTwFBPjCOuh

Entry address:
0x30CB

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 38, 3F, 42, 00, E8, F1, 2B, 00, 00, A3, 84, 3E, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 30, F4, 41, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 80, 36, 42, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 90, 42, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Entropy:
7.9998

Packer / compiler:
Nullsoft install system v2.x

Code size:
22.5 KB (23,040 bytes)

The file veohwebplayersetup_eng.exe has been seen being distributed by the following URL.

http://ll-appserver.veoh.com/static/downloads/.../VeohWebPlayerSetup_eng.exe

Remove veohwebplayersetup_eng.exe - Powered by Reason Core Security