setup_v2.exe

Tuguu SLU

The Tuguu download and install manager uses the DomalIQ installer to bundle additional adware offers such as toolbars and browser extensions during the setup process. This software distributes modified installers which are not the same as the original distributed by the author. The application setup_v2.exe by Tuguu SLU has been detected as adware by 35 anti-malware scanners. The program is a setup application that uses the TUGUU DomaIQ Setup installer. During install, it bundles potentially unwanted software on a user's computer at the same time without adequate consent.
Publisher:
Tuguu SLU  (signed and verified)

MD5:
89ff189b19991fdcb237efcb0ea6a1d0

SHA-1:
4045a88d214977508266f6a9fbd6ef8f0cb9234b

SHA-256:
7af5950e657e65d723ebc84141dc2a0c5cbc2e99aa88b08fe5c6f1fb4e488933

Scanner detections:
35 / 68

Status:
Adware

Explanation:
Uses the DomainIQ download manager to bundle additional potentially unwanted software without adequate consent.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
11/23/2024 9:35:48 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Dropped:Application.Bundler.DomaIQ.Q
5705736

Agnitum Outpost
PUA.DomaIQ
7.1.1

AhnLab V3 Security
PUP/Win32.DomaIQ
2015.06.09

Arcabit
Application.Bundler.DomaIQ.Q
1.0.0.425

avast!
DomaIQ-FD [PUP]
150602-1

AVG
Adware Skodna.Generic_r.HV
2014.0.4311

Bitdefender
Dropped:Application.Bundler.DomaIQ.Q
1.0.20.795

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Domaiq-206
0.98/20553

Comodo Security
Application.Win32.DMIQ.A
22382

Dr.Web
Adware.Downware.1722
9.0.1.05190

Emsisoft Anti-Malware
Dropped:Application.Bundler.DomaIQ.Q
10.0.0.5366

ESET NOD32
MSIL/DomaIQ.J potentially unwanted application
7.0.302.0

Fortinet FortiGate
Adware/DomaIQ
6/8/2015

F-Prot
W32/MSIL_Troj.CL2.gen
4.6.5.141

F-Secure
Riskware.Dropped:Application.Bundler.DomaIQ
5.14.151

G Data
Dropped:Application.Bundler.DomaIQ
15.6.25

IKARUS anti.virus
Trojan.SuspectCRC
t3scan.1.9.5.0

K7 AntiVirus
Unwanted-Program
13.204.16173

Kaspersky
not-a-virus:AdWare.Win32.DomaIQ
15.0.0.543

Malwarebytes
PUP.Optional.BundleInstaller
v2015.06.08.03

McAfee
Program.CryptDomaIQ
17.6.569.0

MicroWorld eScan
Dropped:Application.Bundler.DomaIQ.Q
16.0.0.477

NANO AntiVirus
Trojan.Win32.Downware.crcepu
0.30.24.1636

Norman
Dropped:Application.Bundler.DomaIQ.Q
02.06.2015 14:23:46

nProtect
Trojan-Clicker/W32.DomaIQ.459704
15.06.08.01

Panda Antivirus
PUP/MultiToolbar.A
15.06.08.03

Quick Heal
Adware.Domal.A5
6.15.14.00

Reason Heuristics
PUP.Tuguu.Bundler
15.6.8.11

Rising Antivirus
PE:PUF.DomaIQ!1.9EEB
23.00.65.15606

Sophos
PUA 'DomainIQ pay-per install'
5.15

Total Defense
Win32/DomainIQ.UYCKWBB
37.1.62.1

Vba32 AntiVirus
AdWare.DomaIQ
3.12.26.4

VIPRE Antivirus
Threat.4150696
40828

Zillya! Antivirus
Downloader.Agent.Win32.183698
2.0.0.2212

File size:
448.9 KB (459,704 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
TUGUU DomaIQ Setup

Common path:
C:\users\{user}\downloads\setup_v2.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
2/7/2013 6:00:00 PM

Valid to:
2/8/2014 5:59:59 PM

Subject:
CN=Tuguu SLU, OU=N/A, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Tuguu SLU, L=Adeje, S=Santa Cruz de Tenrife, C=ES

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
552127982028C352ADDA5CA8F6C0BAE7

File PE Metadata
Compilation timestamp:
12/9/2013 9:47:37 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
6144:d0PCRT5LgXEhN7th62W4hPpmM7wyxGV6jQ6100nmK1r8iw49cCiK1YnF:XgXEhxth62phxB7wyxGV6Z/4N49cCryF

Entry address:
0xCD4C

Entry point:
E8, BD, 56, 00, 00, E9, 78, FE, FF, FF, 6A, 0C, 68, C8, 22, 42, 00, E8, BA, 04, 00, 00, 83, 65, E4, 00, 8B, 75, 08, 3B, 35, 70, 98, 42, 00, 77, 22, 6A, 04, E8, A8, 58, 00, 00, 59, 83, 65, FC, 00, 56, E8, AF, 60, 00, 00, 59, 89, 45, E4, C7, 45, FC, FE, FF, FF, FF, E8, 09, 00, 00, 00, 8B, 45, E4, E8, C6, 04, 00, 00, C3, 6A, 04, E8, A3, 57, 00, 00, 59, C3, 8B, FF, 55, 8B, EC, 56, 8B, 75, 08, 83, FE, E0, 0F, 87, A1, 00, 00, 00, 53, 57, 8B, 3D, 80, D0, 41, 00, 83, 3D, 14, 85, 42, 00, 00, 75, 18, E8, 0F, 4D, 00...
 
[+]

Entropy:
7.3968

Code size:
111 KB (113,664 bytes)

The file setup_v2.exe has been seen being distributed by the following URL.

Remove setup_v2.exe - Powered by Reason Core Security