parent.txt

Tuguu S.L.U.

The Tuguu download and install manager uses the DomalIQ installer to bundle additional adware offers such as toolbars and browser extensions during the setup process. This software distributes modified installers which are not the same as the original distributed by the author. The file parent.txt by Tuguu S.L.U has been detected as adware by 33 anti-malware scanners. The program is a setup application that uses the TUGUU DomaIQ Setup installer. It is also typically executed from the user's temporary directory. The file has been seen being downloaded from dlp.cloudsvr40.com and multiple other hosts.
Publisher:
Tuguu S.L.U.  (signed and verified)

MD5:
a806a10f64c8e97b41f18de871752b12

SHA-1:
1a298fb9413bd145342b5be39952104b9ded1c63

SHA-256:
6e5c76bdf52b7aa1300a0ed28364a420151618fa310a88eace17327055e98a13

Scanner detections:
33 / 68

Status:
Adware

Explanation:
Uses the DomainIQ download manager to bundle additional potentially unwanted software without adequate consent.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/26/2024 4:56:29 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Dropped:Adware.Generic.654694
700

Agnitum Outpost
PUA.DomaIQ
7.1.1

AhnLab V3 Security
PUP/Win32.DomaIQ
2015.03.07

Avira AntiVirus
PUA/DomaIQ.Gen2
7.11.214.140

avast!
Win32:DomaIQ-CM [PUP]
2014.9-150307

AVG
Adware Skodna.Generic_r
2016.0.3178

Bitdefender
Dropped:Adware.Generic.654694
1.0.20.330

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Domaiq-109
0.98/20157

Comodo Security
Application.Win32.Agent.D
21321

Dr.Web
Trojan.PayInt.9
9.0.1.066

Emsisoft Anti-Malware
Dropped:Adware.Generic.654694
8.15.03.07.05

ESET NOD32
MSIL/DomaIQ.N potentially unwanted application
9.7.0.302.0

Fortinet FortiGate
Adware/DomaIQ
3/7/2015

F-Prot
W32/DomaIQ.B.gen
v6.4.7.1.166

F-Secure
Spyware: Adware:W32/DomaIQ
11.2015-07-03_7

G Data
Dropped:Adware.Generic.654694
15.3.25

herdProtect (fuzzy)
2015.6.13.17

K7 AntiVirus
Unwanted-Program
13.200.15187

Kaspersky
not-a-virus:AdWare.MSIL.DomaIQ
14.0.0.2384

McAfee
Program.Adware-DomaIQ
5600.6834

MicroWorld eScan
Dropped:Adware.Generic.654694
16.0.0.198

NANO AntiVirus
Riskware.Win32.PayInt.cscjxh
0.30.0.296

Norman
Dropped:Adware.Generic.654694
11.20150307

nProtect
Trojan-Clicker/W32.Agent.469984
15.03.06.01

Panda Antivirus
PUP/MultiToolbar.A
15.03.07.06

Quick Heal
Adware.Domal.A5
3.15.14.00

Reason Heuristics
PUP.Bundler.Tuguu
15.3.7.5

Rising Antivirus
PE:PUF.DomaIQ!1.9EEB
23.00.65.15305

Sophos
PUA 'DomainIQ pay-per install'
5.11

Vba32 AntiVirus
BScope.Downware.DomaIQ
3.12.26.3

VIPRE Antivirus
Threat.4783262
35418

Zillya! Antivirus
Adware.Lollipop.Win32.113
2.0.0.2090

File size:
459 KB (469,984 bytes)

Bundler/Installer:
TUGUU DomaIQ Setup

Common path:
C:\users\{user}\appdata\local\temp\{random}.tmp\parent.txt

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
8/27/2013 5:00:00 PM

Valid to:
8/27/2014 4:59:59 PM

Subject:
CN=Tuguu S.L.U., OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Tuguu S.L.U., L=Adeje, S=SANTA CRUZ DE TENERIFE, C=ES

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
21FCDE5EAE401DF690786A73C48E74F8

File PE Metadata
Compilation timestamp:
12/27/2013 4:49:25 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
6144:+F/Lw/FSC3ELBEk4o1jqHZSBcQ49blnCIYq8PiJOd/zsGEo/l1GXPUaYC:KC3mBEVKOIg9xnHYqedQFAMUg

Entry address:
0xD182

Entry point:
E8, C4, 63, 00, 00, E9, 78, FE, FF, FF, 6A, 0C, 68, 28, 43, 42, 00, E8, C4, 04, 00, 00, 83, 65, E4, 00, 8B, 75, 08, 3B, 35, 58, A8, 42, 00, 77, 22, 6A, 04, E8, AF, 65, 00, 00, 59, 83, 65, FC, 00, 56, E8, B6, 6D, 00, 00, 59, 89, 45, E4, C7, 45, FC, FE, FF, FF, FF, E8, 09, 00, 00, 00, 8B, 45, E4, E8, D0, 04, 00, 00, C3, 6A, 04, E8, AA, 64, 00, 00, 59, C3, 8B, FF, 55, 8B, EC, 56, 8B, 75, 08, 83, FE, E0, 0F, 87, A1, 00, 00, 00, 53, 57, 8B, 3D, 70, F0, 41, 00, 83, 3D, 1C, A5, 42, 00, 00, 75, 18, E8, 6A, 5C, 00...
 
[+]

Entropy:
7.4236

Code size:
119.5 KB (122,368 bytes)

The file parent.txt has been seen being distributed by the following 2 URLs.

Remove parent.txt - Powered by Reason Core Security