player.exe

Digital Plugin S.l.

This is the Softpulse installer which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application player.exe by Digital Plugin S.l has been detected as adware by 8 anti-malware scanners. The program is a setup application that uses the Softpulse SoftwareBundler installer. The file has been seen being downloaded from www.lpmxp2081.com.
Publisher:
Digital Plugin S.l.  (signed and verified)

MD5:
5faefd911357b3396321a8dbdf9a974e

SHA-1:
c5d7e1a39a9f58e96cec9ff784a959438de78074

SHA-256:
1a1fc20e8152149822879d83183c35bcba5daf63128cc44620364f59a942a1e8

Scanner detections:
8 / 68

Status:
Adware

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
11/16/2024 5:50:41 AM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
TR/Dropper.Gen
7.11.30.172

AVG
Generic
2015.0.3397

ESET NOD32
Win32/SoftPulse (variant)
8.10179

herdProtect (fuzzy)
2014.9.10.11

McAfee
Socrydo
5600.7053

Norman
Malware
11.20140910

Reason Heuristics
PUP.DigitalPluginSl.G
14.7.30.18

VIPRE Antivirus
Threat.4783235
31208

File size:
1.2 MB (1,237,200 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Softpulse SoftwareBundler

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
7/14/2014 2:00:00 AM

Valid to:
7/15/2015 1:59:59 AM

Subject:
CN=Digital Plugin S.l., O=Digital Plugin S.l., L=Guia de Isora, S=Santa Cruz de Tenerife, C=ES

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
229111B20CCF13394E8E6CA9EAB4121F

File PE Metadata
Compilation timestamp:
7/30/2014 3:46:26 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
24576:U0y9G36xN9G36xtMHVL0ehyHlT3ftMEjbP3AnyKteCfbRcR1b4RUH:U035nAKyFDftMeC1Fcs4

Entry address:
0x3816

Entry point:
E8, 04, 44, 00, 00, E9, 7F, FE, FF, FF, E9, B7, 28, 00, 00, 3B, 0D, F0, 90, 41, 00, 75, 02, F3, C3, E9, 62, 49, 00, 00, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, CC, 57, 56, 8B, 74, 24, 10, 8B, 4C, 24, 14, 8B, 7C, 24, 0C, 8B, C1, 8B, D1, 03, C6, 3B, FE, 76, 08, 3B, F8, 0F, 82, 68, 03, 00, 00, 0F, BA, 25, F4, AF, 41, 00, 01, 73, 07, F3, A4, E9, 17, 03, 00, 00, 81, F9, 80, 00, 00, 00, 0F, 82, CE, 01, 00, 00, 8B, C7, 33, C6, A9, 0F, 00, 00, 00, 75, 0E, 0F, BA, 25, 50, 91, 41, 00, 01, 0F, 82, DA, 04, 00, 00...
 
[+]

Code size:
63 KB (64,512 bytes)

The file player.exe has been seen being distributed by the following URL.

Remove player.exe - Powered by Reason Core Security