player.exe

Digital Plugin S.l.

This is the Softpulse installer which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application player.exe by Digital Plugin S.l has been detected as adware by 30 anti-malware scanners. The program is a setup application that uses the Softpulse SoftwareBundler installer. During install, it bundles potentially unwanted software on a user's computer at the same time without adequate consent. The file has been seen being downloaded from ttb.lpmxp2124.com.
Publisher:
Digital Plugin S.l.  (signed and verified)

MD5:
322e34cf7bb17c485e7282e1a8e57963

SHA-1:
107419fae6be7b008b67a1e3e4b223944f9422e2

SHA-256:
22782f731f1f1f19c17be17e046f1e7eaef969a4fae6d85ec88427b9b52d32e6

Scanner detections:
30 / 68

Status:
Adware

Explanation:
May bundle additional potentially unwanted software such as adware during setup.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/27/2024 4:57:49 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Adware.Graftor.154268
843

Agnitum Outpost
PUA.Downloader
7.1.1

AhnLab V3 Security
PUP/Win32.DomaIQ
2014.10.15

Avira AntiVirus
TR/Dropper.Gen
7.11.30.172

avast!
Win32:PUP-gen [PUP]
141003-0

AVG
Found Win32/DH{gRJ UIEHeVRPFVGBFYEJHFOBE0GBDw}
2014.0.4037

Bitdefender
Gen:Variant.Adware.Graftor.154268
1.0.20.1435

Clam AntiVirus
Win.Trojan.Agent-784025
0.98/21411

Comodo Security
Application.Win32.SoftPulse.J
19801

Dr.Web
Trojan.DownLoader11.28135
9.0.1.05190

Emsisoft Anti-Malware
Gen:Variant.Graftor.154268
14.10.14

ESET NOD32
Win32/SoftPulse.J potentially unwanted application
7.0.302.0

Fortinet FortiGate
W32/Buzus.SBAE!tr
10/14/2014

F-Prot
W32/A-022719ea
v6.4.7.1.166

F-Secure
Gen:Variant.Adware.Graftor.154268
11.2014-14-10_3

G Data
Gen:Variant.Adware.Graftor.154268
14.10.24

IKARUS anti.virus
Trojan.Win32.Buzus
t3scan.1.7.8.0

K7 AntiVirus
Unwanted-Program
13.183.13676

Kaspersky
Trojan.Win32.Buzus
15.0.0.494

Malwarebytes
PUP.Optional.BundleInstaller.A
v2014.10.14.02

McAfee
Socrydo
5600.6977

MicroWorld eScan
Gen:Variant.Adware.Graftor.154268
15.0.0.861

NANO AntiVirus
Trojan.Win32.SoftPulse.ddzwdt
0.28.2.62671

Norman
Malware
11.20141014

nProtect
Trojan-Clicker/W32.Agent.1139944
14.10.14.01

Reason Heuristics
PUP.DigitalPluginSl.G
14.10.14.12

Sophos
SoftPulse
4.98

Vba32 AntiVirus
AdWare.Agent
3.12.26.3

VIPRE Antivirus
Threat.4150696
33706

Zillya! Antivirus
Adware.Agent.Win32.11460
2.0.0.1955

File size:
1.1 MB (1,139,944 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Softpulse SoftwareBundler

Common path:
C:\users\{user}\downloads\player.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
7/13/2014 7:00:00 PM

Valid to:
7/14/2015 6:59:59 PM

Subject:
CN=Digital Plugin S.l., O=Digital Plugin S.l., L=Guia de Isora, S=Santa Cruz de Tenerife, C=ES

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
229111B20CCF13394E8E6CA9EAB4121F

File PE Metadata
Compilation timestamp:
8/19/2014 5:51:25 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
24576:Oio2C4Tz86EE1by3swR9HrwNmojHuD/bsytUltKo+5+VYrle5sC:44TzJJm9R9kFTSbNtkwo+5Vrle5v

Entry address:
0x3F56

Entry point:
E8, 09, 27, 00, 00, E9, 7F, FE, FF, FF, 57, 56, 8B, 74, 24, 10, 8B, 4C, 24, 14, 8B, 7C, 24, 0C, 8B, C1, 8B, D1, 03, C6, 3B, FE, 76, 08, 3B, F8, 0F, 82, 68, 03, 00, 00, 0F, BA, 25, 14, A6, 41, 00, 01, 73, 07, F3, A4, E9, 17, 03, 00, 00, 81, F9, 80, 00, 00, 00, 0F, 82, CE, 01, 00, 00, 8B, C7, 33, C6, A9, 0F, 00, 00, 00, 75, 0E, 0F, BA, 25, A8, 90, 41, 00, 01, 0F, 82, DA, 04, 00, 00, 0F, BA, 25, 14, A6, 41, 00, 00, 0F, 83, A7, 01, 00, 00, F7, C7, 03, 00, 00, 00, 0F, 85, B8, 01, 00, 00, F7, C6, 03, 00, 00, 00...
 
[+]

Entropy:
7.7320  (probably packed)

Code size:
62 KB (63,488 bytes)

The file player.exe has been seen being distributed by the following URL.

Remove player.exe - Powered by Reason Core Security