player setup.exe

Payments Interactive SL

This is the Tuguu DomaIQ download manager which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application player setup.exe by Payments Interactive SL has been detected as adware by 24 anti-malware scanners. The program is a setup application that uses the TUGUU DomaIQ Setup installer. This program installs potentially unwanted software on your PC at the same time as the software you are trying to install, without adequate consent.
Publisher:
Payments Interactive SL  (signed and verified)

MD5:
8cff9e5139c8f37b9001e4ac0cd61237

SHA-1:
b2c9dbe84166911fb750e8473426b68afd6dee89

SHA-256:
9c9e5c7a64476918afd04584bed5a6a867a79ee90cddfdb70687a0003e2327d8

Scanner detections:
24 / 68

Status:
Adware

Explanation:
Uses the DomainIQ download manager to bundle additional potentially unwanted software without adequate consent.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
12/28/2024 1:44:52 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Kazy.380151
984

Agnitum Outpost
PUA.DomaIQ
7.1.1

AhnLab V3 Security
PUP/Win32.DomaIQ
2014.05.27

Avira AntiVirus
Adware/Strictor.55983
7.11.151.164

avast!
DomaIQ-CO [PUP]
140527-0

AVG
Adware DomaIQ.CW
2014.0.3950

Bitdefender
Gen:Variant.Application.Bundler.DomaIQ.7
1.0.20.730

Comodo Security
Application.Win32.DomaIQ.BB
18335

Dr.Web
Adware.Downware.3587
9.0.1.05190

ESET NOD32
Win32/DomaIQ.BB potentially unwanted application
7.0.302.0

F-Secure
Gen:Variant.Application.Bundler
11.2014-26-05_2

G Data
Gen:Variant.Application.Bundler.DomaIQ
14.5.24

IKARUS anti.virus
AdWare.DomaIQ
t3scan.1.6.1.0

K7 AntiVirus
Trojan
13.178.12203

Kaspersky
not-a-virus:AdWare.MSIL.DomaIQ
14.0.0.3805

Malwarebytes
PUP.Optional.Domalq
v2014.05.26.09

McAfee
PUP-FJV!8CFF9E5139C8
5600.7118

MicroWorld eScan
Gen:Variant.Application.Bundler.DomaIQ.7
15.0.0.438

NANO AntiVirus
Riskware.Win32.Lollipop.cyamlo
0.28.0.59921

Panda Antivirus
PUP/MultiToolbar.A
14.05.26.09

Reason Heuristics
PUP.Installer.PaymentsInteractiveSL.M
14.8.7.23

Rising Antivirus
PE:Malware.DomaIQ!6.1975
23.00.65.14524

Sophos
DomainIQ pay-per install
4.98

VIPRE Antivirus
Threat.4150696
29560

File size:
600.1 KB (614,536 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
TUGUU DomaIQ Setup

Common path:
C:\users\{user}\downloads\player setup.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
11/28/2013 12:00:00 AM

Valid to:
11/28/2014 11:59:59 PM

Subject:
CN=Payments Interactive SL, O=Payments Interactive SL, STREET=Camino las fayeras 1, L=Puntagorda, S=Santa cruz de Tenerife, PostalCode=38789, C=ES

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
00D9CDF60C136552E24EDA78215D3EE028

File PE Metadata
Compilation timestamp:
5/7/2014 9:26:16 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
12288:prWMz79oSQAn1tEIEnB4GOHc9Zv6JD0riC94jWe11Ev4Fi2iwQjSQ3VI:paMFHn1tEITo+CYX9FgjSQ3m

Entry address:
0x4095

Entry point:
E8, 10, 2F, 00, 00, E9, 39, FE, FF, FF, E9, A5, 0F, 00, 00, 3B, 0D, 20, 72, 42, 00, 75, 02, F3, C3, E9, 2F, 38, 00, 00, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 57, 56, 8B, 74, 24, 10, 8B, 4C, 24, 14, 8B, 7C, 24, 0C, 8B, C1, 8B, D1, 03, C6, 3B, FE, 76, 08, 3B, F8, 0F, 82, 68, 03, 00, 00, 0F, BA, 25, 4C, 8E, 42, 00, 01, 73, 07, F3, A4, E9, 17, 03, 00, 00, 81, F9, 80, 00, 00, 00, 0F, 82, CE, 01, 00, 00, 8B, C7, 33, C6, A9, 0F, 00, 00, 00, 75, 0E, 0F, BA, 25, 28, 72, 42, 00, 01, 0F, 82, DA, 04, 00...
 
[+]

Entropy:
6.5900

Code size:
108 KB (110,592 bytes)

The file player setup.exe has been seen being distributed by the following URL.

Remove player setup.exe - Powered by Reason Core Security