setup_v2.exe

Tuguu SLU

The Tuguu download and install manager uses the DomalIQ installer to bundle additional adware offers such as toolbars and browser extensions during the setup process. This software distributes modified installers which are not the same as the original distributed by the author. The application setup_v2.exe by Tuguu SLU has been detected as adware by 33 anti-malware scanners. The program is a setup application that uses the TUGUU DomaIQ Setup installer. During install, it bundles potentially unwanted software on a user's computer at the same time without adequate consent.
Publisher:
Tuguu SLU  (signed and verified)

MD5:
e138d06adb9a85f6b0262ac267da5452

SHA-1:
a5e64868943824a9edb9812d34ec6c0c212d9eeb

SHA-256:
3a7aae4dc9afa11d6c233ce374dd96f2f7ce410e927cd7cad8baa551666511f5

Scanner detections:
33 / 68

Status:
Adware

Explanation:
Uses the DomainIQ download manager to bundle additional potentially unwanted software without adequate consent.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
12/25/2024 5:08:23 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.Generic.10386886
943

Agnitum Outpost
PUA.DomaIQ
7.1.1

AhnLab V3 Security
PUP/Win32.DomaIQ
2014.07.07

Avira AntiVirus
APPL/Lunacom.A
7.11.158.178

avast!
DomaIQ-AG [PUP]
140617-1

AVG
Adware Skodna.Generic_r.HV
2014.0.3986

Bitdefender
Trojan.Generic.10386886
1.0.20.935

Clam AntiVirus
Win.Trojan.Domaiq-14
0.98/19086

Comodo Security
Application.Win32.DMIQ.A
18790

Dr.Web
Adware.Downware.1722
9.0.1.05190

Emsisoft Anti-Malware
Trojan.Generic.10386886
8.14.07.06.07

ESET NOD32
MSIL/DomaIQ.J potentially unwanted application
7.0.302.0

Fortinet FortiGate
W32/DomaIQ.AN!tr
7/6/2014

F-Prot
W32/MSIL_Troj.CL2.gen
4.6.5.141

F-Secure
Trojan.Generic.10386886
11.2014-06-07_1

G Data
Trojan.Generic.10386886
14.7.24

IKARUS anti.virus
Trojan.SuspectCRC
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.180.12626

Kaspersky
not-a-virus:AdWare.Win32.Lollipop
15.0.0.463

Malwarebytes
PUP.Optional.BundleInstaller
v2014.07.06.07

McAfee
CryptDomaIQ
5600.7077

MicroWorld eScan
Trojan.Generic.10386886
15.0.0.561

NANO AntiVirus
Trojan.Win32.Downware.crcepu
0.28.0.60577

Norman
DomaIQ.YSY
11.20140706

nProtect
Trojan-Clicker/W32.DomaIQ.459720
14.07.06.01

Panda Antivirus
PUP/MultiToolbar.A
14.07.06.07

Quick Heal
Adware.Domal.A5
7.14.14.00

Reason Heuristics
PUP.Installer.TuguuSLU.I
14.8.7.21

Rising Antivirus
PE:PUF.DomaIQ!1.9EEB
23.00.65.14704

Sophos
DomainIQ pay-per install
4.98

Vba32 AntiVirus
OScope.Downware.DomaIQ
3.12.26.3

VIPRE Antivirus
Threat.4150696
29708

Zillya! Antivirus
Downloader.Agent.Win32.183698
2.0.0.1847

File size:
448.9 KB (459,720 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
TUGUU DomaIQ Setup

Common path:
C:\users\{user}\downloads\setup_v2.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
2/7/2013 6:00:00 PM

Valid to:
2/8/2014 5:59:59 PM

Subject:
CN=Tuguu SLU, OU=N/A, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Tuguu SLU, L=Adeje, S=Santa Cruz de Tenrife, C=ES

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
552127982028C352ADDA5CA8F6C0BAE7

File PE Metadata
Compilation timestamp:
12/9/2013 9:47:37 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
12288:HgXEhxth62phxB7wyxGV6Z/4N49cCrpHW:R3z9tfGV6N4N4SQY

Entry address:
0xCD4C

Entry point:
E8, BD, 56, 00, 00, E9, 78, FE, FF, FF, 6A, 0C, 68, C8, 22, 42, 00, E8, BA, 04, 00, 00, 83, 65, E4, 00, 8B, 75, 08, 3B, 35, 70, 98, 42, 00, 77, 22, 6A, 04, E8, A8, 58, 00, 00, 59, 83, 65, FC, 00, 56, E8, AF, 60, 00, 00, 59, 89, 45, E4, C7, 45, FC, FE, FF, FF, FF, E8, 09, 00, 00, 00, 8B, 45, E4, E8, C6, 04, 00, 00, C3, 6A, 04, E8, A3, 57, 00, 00, 59, C3, 8B, FF, 55, 8B, EC, 56, 8B, 75, 08, 83, FE, E0, 0F, 87, A1, 00, 00, 00, 53, 57, 8B, 3D, 80, D0, 41, 00, 83, 3D, 14, 85, 42, 00, 00, 75, 18, E8, 0F, 4D, 00...
 
[+]

Entropy:
7.3968

Code size:
111 KB (113,664 bytes)

The file setup_v2.exe has been seen being distributed by the following 2 URLs.

Remove setup_v2.exe - Powered by Reason Core Security