player.exe

Payments Interactive SL

This is the Tuguu DomaIQ download manager which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application player.exe by Payments Interactive SL has been detected as adware by 30 anti-malware scanners. The program is a setup application that uses the TUGUU DomaIQ Setup installer. During install, it bundles potentially unwanted software on a user's computer at the same time without adequate consent. The file has been seen being downloaded from dlp.cloudsvr0101.com.
Publisher:
Payments Interactive SL  (signed and verified)

MD5:
01ac3649fc095108d44298202955edf0

SHA-1:
3ea0b5bfe9702b06c5c5f11eee4e82d1df0895b5

SHA-256:
e4d9d1a529d47298b275064745f6a9f25ce7ac91837c254e1faa1d6d0d28aa23

Scanner detections:
30 / 68

Status:
Adware

Explanation:
Uses the DomainIQ download manager to bundle additional potentially unwanted software without adequate consent.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
11/8/2024 4:57:25 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Generic.600253
951

Agnitum Outpost
PUA.DomaIQ
7.1.1

AhnLab V3 Security
Adware/Win32.DomaIQ
2014.06.29

Avira AntiVirus
APPL/DomaIQ.Gen
7.11.157.134

avast!
DomaIQ-CO [PUP]
140617-1

AVG
Adware Skodna.Bundle_r.W
2014.0.3986

Bitdefender
Application.Generic.600253
1.0.20.900

Clam AntiVirus
Win.Adware.Domaiq-4
0.98/21411

Comodo Security
Application.Win32.DomaIQ.URT
18707

Dr.Web
Trojan.DownLoader9.15042
9.0.1.05190

ESET NOD32
Win32/DomaIQ.AZ potentially unwanted application
7.0.302.0

F-Prot
W32/DomaIQ.D3.gen
v6.4.7.1.166

F-Secure
Adware:W32/DomaIQ
11.2014-29-06_1

G Data
Application.Generic.600253
14.6.24

IKARUS anti.virus
AdWare.DomaIQ
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.180.12553

Kaspersky
not-a-virus:AdWare.MSIL.DomaIQ
15.0.0.463

Malwarebytes
PUP.Optional.BundleInstaller.A
v2014.06.29.03

McAfee
CryptDomaIQ
5600.7085

MicroWorld eScan
Application.Generic.600253
15.0.0.540

NANO AntiVirus
Trojan.Win32.DomaIQ.ctadmg
0.28.0.60475

nProtect
Trojan-Clicker/W32.Agent.320632
14.06.29.01

Panda Antivirus
PUP/MultiToolbar.A
14.06.29.03

Quick Heal
AdWare.MSIL.r3 (Not a Virus)
6.14.14.00

Reason Heuristics
PUP.PaymentsInteractiveSL.G
14.8.7.23

Sophos
DomainIQ pay-per install
4.98

SUPERAntiSpyware
Adware.DomaIQ/Variant
10515

Vba32 AntiVirus
BScope.Downware.DomaIQ
3.12.26.3

VIPRE Antivirus
Threat.4783235
29708

Zillya! Antivirus
Adware.DomaIQ.Win32.111
2.0.0.1841

File size:
313.1 KB (320,632 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
TUGUU DomaIQ Setup

Common path:
C:\users\{user}\downloads\player.exe

Digital Signature
Authority:
DigiCert Inc

Valid from:
10/15/2013 1:00:00 AM

Valid to:
12/19/2014 1:00:00 PM

Subject:
CN=Payments Interactive SL, O=Payments Interactive SL, L=Puntagorda, S=Santa Cruz de Tenerife / Canarias, C=ES

Issuer:
CN=DigiCert Assured ID Code Signing CA-1, OU=www.digicert.com, O=DigiCert Inc, C=US

Serial number:
060CE3456FDDB3F98DA9EDA1B876842F

File PE Metadata
Compilation timestamp:
1/30/2014 7:50:49 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
3072:6wbqks+CRoRwGg00jN/wfLEAy8zsH1j05sYUncjIdqIdpx1xmLcgcO9U004NOFVN:6weks+CRE0mfLS8zW1Osdnp1PuJ934Y6

Entry address:
0x1576

Entry point:
E8, CC, 26, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A3, D8, CF, 40, 00, 89, 0D, D4, CF, 40, 00, 89, 15, D0, CF, 40, 00, 89, 1D, CC, CF, 40, 00, 89, 35, C8, CF, 40, 00, 89, 3D, C4, CF, 40, 00, 66, 8C, 15, F0, CF, 40, 00, 66, 8C, 0D, E4, CF, 40, 00, 66, 8C, 1D, C0, CF, 40, 00, 66, 8C, 05, BC, CF, 40, 00, 66, 8C, 25, B8, CF, 40, 00, 66, 8C, 2D, B4, CF, 40, 00, 9C, 8F, 05, E8, CF, 40, 00, 8B, 45, 00, A3, DC, CF, 40, 00, 8B, 45, 04, A3, E0, CF, 40, 00, 8D, 45, 08, A3, EC, CF, 40...
 
[+]

Code size:
30.5 KB (31,232 bytes)

The file player.exe has been seen being distributed by the following URL.

Remove player.exe - Powered by Reason Core Security