veohwebplayersetup_upgrade_eng.exe

Qlipso Inc.

The application veohwebplayersetup_upgrade_eng.exe by Qlipso has been detected as a potentially unwanted program by 14 anti-malware scanners. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer. The installer uses the OpenCandy monitzation platform which will donwload and install offers in the setup for potentially unwanted software including ad/search-supported toolbars.
Publisher:
Qlipso Inc.  (signed and verified)

MD5:
c59111ee0f40df96b739c1d4070ef979

SHA-1:
3c188e9ad1380d28f338079fe3141f54554d4ddc

SHA-256:
e9eacaf62db3e3251ad9bf9e7c549dd962f4664a38f923d8e370e68ef73b28b6

Scanner detections:
14 / 68

Status:
Potentially unwanted

Explanation:
Packages the OpenCandy software bundler that offers to install additional software and may include web browser add-ons and toolbars which display advertising (based on publisher settings and geo context).

Analysis date:
4/25/2024 6:05:32 AM UTC  (today)

Scan engine
Detection
Engine version

avast!
Win32:Adware-gen [Adw]
2014.9-150829

Comodo Security
Heur.Suspicious
9982

Dr.Web
Adware.Zugo.49
9.0.1.0241

ESET NOD32
9.6434

Fortinet FortiGate
Riskware/Toolbar
8/29/2015

F-Prot
File is damaged
v6.4.6.2.117

G Data
Win32.Adware.OpenCandy
15.8.25

herdProtect (fuzzy)
2015.10.25.17

Malwarebytes
PUP.Optional.OpenCandy
v2015.08.29.06

McAfee
Artemis!C59111EE0F40
5600.6659

NANO AntiVirus
Riskware.Win32.Zugo.deioal
0.30.0.65070

Rising Antivirus
Trojan.Win32.Generic.1287BA48
23.00.65.15827

Trend Micro House Call
Suspicious_GEN.F47V0105
7.2.241

VIPRE Antivirus
Zugo Ltd
10359

File size:
18.4 MB (19,323,632 bytes)

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Common path:
C:\users\{user}\videos\veoh\veohwebplayersetup_upgrade_eng.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
5/24/2011 5:00:00 PM

Valid to:
5/24/2012 4:59:59 PM

Subject:
CN=Qlipso Inc., OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Qlipso Inc., L=Santa Monica, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
087E17D7B2CA0D412673C947F2D84BDD

File PE Metadata
Compilation timestamp:
12/5/2009 2:50:41 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
393216:SulxRfO43nxZBZNzGMXURgvJLYi3uzahRohFBq+b2U5CvH2yR3Rx:flbO4BdpGMERwJF0aTwFBPjCOux

Entry address:
0x30CB

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 38, 3F, 42, 00, E8, F1, 2B, 00, 00, A3, 84, 3E, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 30, F4, 41, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 80, 36, 42, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 90, 42, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Entropy:
7.9998

Packer / compiler:
Nullsoft install system v2.x

Code size:
22.5 KB (23,040 bytes)

Remove veohwebplayersetup_upgrade_eng.exe - Powered by Reason Core Security