player.exe

Payments Interactive SL

This is the Tuguu DomaIQ download manager which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application player.exe by Payments Interactive SL has been detected as adware by 14 anti-malware scanners. The program is a setup application that uses the TUGUU DomaIQ Setup installer. During install, it bundles potentially unwanted software on a user's computer at the same time without adequate consent. The file has been seen being downloaded from dlp.cloudbox011.com.
Publisher:
Payments Interactive SL  (signed and verified)

MD5:
7666a1b797f70c5867d04cac5d8a1972

SHA-1:
87e68d588b865718e57da58b4127562b00ff18f8

SHA-256:
2a9ff3e0db1b3dc1e42d67b19346b2da67858ce8fd3abc3e63d81b42e3c9803c

Scanner detections:
14 / 68

Status:
Adware

Explanation:
Uses the DomainIQ download manager to bundle additional potentially unwanted software without adequate consent.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
11/12/2024 7:26:36 PM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.Lollipop
7.1.1

Avira AntiVirus
APPL/DomaIQ.A.10
7.11.142.4

AVG
DomaIQ
2015.0.3510

Comodo Security
Application.Win32.DomaIQ.PUP
18070

Dr.Web
Adware.Downware.2479
9.0.1.098

ESET NOD32
Win32/DomaIQ.BB (variant)
8.9651

Kaspersky
not-a-virus:AdWare.Win32.Lollipop
14.0.0.4047

Malwarebytes
PUP.Optional.BundleInstaller.A
v2014.04.08.01

McAfee
RDN/Generic PUP.x!b2b
5600.7166

NANO AntiVirus
Riskware.Win32.Lolipop.cwcqls
0.28.0.59048

Panda Antivirus
PUP/MultiToolbar.A
14.04.08.01

Reason Heuristics
PUP.PaymentsInteractiveSL.G
14.8.7.23

Sophos
DomainIQ pay-per install
4.98

VIPRE Antivirus
Trojan.Win32.Generic
28128

File size:
432.5 KB (442,840 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
TUGUU DomaIQ Setup

Common path:
C:\users\{user}\downloads\player.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
11/26/2013 6:00:00 PM

Valid to:
11/27/2014 5:59:59 PM

Subject:
CN=Payments Interactive SL, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Payments Interactive SL, L=Puntagorda, S=Tenerife, C=ES

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
4676DEB3B71CFE510351E4A3DF2A2E15

File PE Metadata
Compilation timestamp:
4/2/2014 11:05:48 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
6144:OPpLaPZZc6XKADMZ/Mnoo0wToPdL8o/FBohRYSP/6JADD8by0caQiqYh:+pA/cgwZ/Moo0wTYoDLSADKf

Entry address:
0x26F0

Entry point:
E8, 23, 2E, 00, 00, E9, 79, FE, FF, FF, 6A, 0C, 68, 40, F2, 41, 00, E8, 06, 01, 00, 00, 8B, 75, 08, 85, F6, 74, 75, 83, 3D, D8, 5F, 42, 00, 03, 75, 43, 6A, 04, E8, 25, 30, 00, 00, 59, 83, 65, FC, 00, 56, E8, 48, 31, 00, 00, 59, 89, 45, E4, 85, C0, 74, 09, 56, 50, E8, 69, 31, 00, 00, 59, 59, C7, 45, FC, FE, FF, FF, FF, E8, 0B, 00, 00, 00, 83, 7D, E4, 00, 75, 37, FF, 75, 08, EB, 0A, 6A, 04, E8, F9, 2E, 00, 00, 59, C3, 56, 6A, 00, FF, 35, 4C, 5A, 42, 00, FF, 15, 64, C0, 41, 00, 85, C0, 75, 16, E8, DD, 0A, 00...
 
[+]

Entropy:
6.6539

Code size:
108 KB (110,592 bytes)

The file player.exe has been seen being distributed by the following URL.

Remove player.exe - Powered by Reason Core Security