player.exe

Payments Interactive SL

This is the Tuguu DomaIQ download manager which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application player.exe by Payments Interactive SL has been detected as adware by 15 anti-malware scanners. The program is a setup application that uses the TUGUU DomaIQ Setup installer. It is also typically executed from an Internet Explorer cache folder.
Publisher:
Payments Interactive SL  (signed and verified)

MD5:
37b39e952dc41fd07e1f45a76b15bb24

SHA-1:
6ce30959625c848b722dfb95516bcdb56e6fac43

SHA-256:
f6efb8aee4e81ca1f165e3f2d9356a91306fcb2cc828dc7e05e1022a61a215bf

Scanner detections:
15 / 68

Status:
Adware

Explanation:
Uses the DomainIQ download manager to bundle additional potentially unwanted software without adequate consent.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
1/10/2025 8:34:21 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.DomaIQ
7.1.1

AhnLab V3 Security
PUP/Win32.DomaIQ
14.03.29

Avira AntiVirus
APPL/DomaIQ.Gen
7.11.140.16

AVG
DomaIQ_r.G
2015.0.3521

Dr.Web
Adware.Downware.2259
9.0.1.088

ESET NOD32
Win32/DomaIQ.BB (variant)
8.9610

IKARUS anti.virus
AdWare.DomaIQ
t3scan.2.2.29

Kaspersky
not-a-virus:AdWare.MSIL.DomaIQ
14.0.0.4098

Malwarebytes
PUP.Optional.DomaIQ
v2014.03.29.08

McAfee
RDN/Generic PUP.x!bv3
5600.7177

Panda Antivirus
PUP/MultiToolbar.A
14.03.29.08

Reason Heuristics
PUP.PaymentsInteractiveSL.G
14.8.7.23

Sophos
DomainIQ pay-per install
4.98

Total Defense
Win32/Tnega.KCDcKOB
37.0.10846

VIPRE Antivirus
Trojan.Win32.Generic
27822

File size:
388.9 KB (398,280 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
TUGUU DomaIQ Setup

Common path:
C:\users\{user}\appdata\local\microsoft\windows\temporary internet files\content.ie5\{random}\player.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
11/27/2013 1:00:00 AM

Valid to:
11/28/2014 12:59:59 AM

Subject:
CN=Payments Interactive SL, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Payments Interactive SL, L=Puntagorda, S=Tenerife, C=ES

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
4676DEB3B71CFE510351E4A3DF2A2E15

File PE Metadata
Compilation timestamp:
3/13/2014 6:43:34 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
6144:mf5g6CMtt7f6QRsOjL1hGn9TOYObx3d5TkPYK:mq6Bt4QRsu1Yn9TvydWl

Entry address:
0x3446

Entry point:
E8, 22, 2A, 00, 00, E9, 7F, FE, FF, FF, 8B, 4C, 24, 04, F7, C1, 03, 00, 00, 00, 74, 24, 8A, 01, 83, C1, 01, 84, C0, 74, 4E, F7, C1, 03, 00, 00, 00, 75, EF, 05, 00, 00, 00, 00, 8D, A4, 24, 00, 00, 00, 00, 8D, A4, 24, 00, 00, 00, 00, 8B, 01, BA, FF, FE, FE, 7E, 03, D0, 83, F0, FF, 33, C2, 83, C1, 04, A9, 00, 01, 01, 81, 74, E8, 8B, 41, FC, 84, C0, 74, 32, 84, E4, 74, 24, A9, 00, 00, FF, 00, 74, 13, A9, 00, 00, 00, FF, 74, 02, EB, CD, 8D, 41, FF, 8B, 4C, 24, 04, 2B, C1, C3, 8D, 41, FE, 8B, 4C, 24, 04, 2B, C1...
 
[+]

Code size:
38 KB (38,912 bytes)

Remove player.exe - Powered by Reason Core Security