java.exe

Payments Interactive SL

This is the Tuguu DomaIQ download manager which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application java.exe by Payments Interactive SL has been detected as adware by 25 anti-malware scanners. The program is a setup application that uses the TUGUU DomaIQ Setup installer. During install, it bundles potentially unwanted software on a user's computer at the same time without adequate consent. With this installer, users are expecting to download the free Oracle Java Runtime but before that occurs they may be presented with additional offers, mostly potentially unwanted software or adware.
Publisher:
Payments Interactive SL  (signed and verified)

MD5:
8c4062e1e33594a5e86de42faff97256

SHA-1:
1c84dc752753b16ec7b00d7d8be0eae2959bd3d7

SHA-256:
4251f747328ca87d4c6ffc403d787517501012ae1fcf4028e8f1c78389943f3f

Scanner detections:
25 / 68

Status:
Adware

Explanation:
May bundle additional potentially unwanted software such as adware during setup.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/23/2024 6:10:21 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Application.Bundler.DomaIQ.5
989

Agnitum Outpost
PUA.Lollipop
7.1.1

AhnLab V3 Security
PUP/Win32.DomaIQ
14.05.22

Avira AntiVirus
APPL/DomaIQ.Gen
7.11.150.242

avast!
DomaIQ-CC [PUP]
140516-1

AVG
Adware DomaIQ.CM
2014.0.3950

Bitdefender
Gen:Variant.Application.Bundler.DomaIQ.3
1.0.20.710

Dr.Web
Trojan.DownLoader9.62498
9.0.1.05190

ESET NOD32
Win32/DomaIQ.BB potentially unwanted application
7.0.302.0

F-Secure
Gen:Variant.Application.Bundler
11.2014-22-05_5

G Data
Gen:Variant.Application.Bundler.DomaIQ
14.5.24

IKARUS anti.virus
PUA.PayInt
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.178.12155

Kaspersky
not-a-virus:AdWare.Win32.Lollipop
14.0.0.3829

Malwarebytes
PUP.Optional.BundleInstaller.A
v2014.05.22.06

McAfee
Adware-DomaIQ!8C4062E1E335
5600.7123

MicroWorld eScan
Gen:Variant.Application.Bundler.DomaIQ.3
15.0.0.426

NANO AntiVirus
Riskware.Win32.Lollipop.cyidtu
0.28.0.59921

Panda Antivirus
PUP/MultiToolbar.A
14.05.22.06

Reason Heuristics
PUP.PaymentsInteractiveSL.E
14.8.7.23

Sophos
Generic PUA PN
4.98

SUPERAntiSpyware
Adware.DomaIQ/Variant
10590

Vba32 AntiVirus
TScope.Trojan.MSIL
3.12.26.0

VIPRE Antivirus
Threat.4783262
29418

Zillya! Antivirus
Adware.DomaIQ.Win32.254
2.0.0.1797

File size:
490.4 KB (502,176 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
TUGUU DomaIQ Setup

Common path:
C:\users\{user}\downloads\java.exe

Digital Signature
Authority:
GoDaddy.com, Inc.

Valid from:
2/7/2014 2:58:55 PM

Valid to:
2/7/2015 2:58:55 PM

Subject:
CN=Payments Interactive SL, O=Payments Interactive SL, L=Adeje, S=Santa cruz de Tenerife, C=ES

Issuer:
CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US

Serial number:
2B974AA267457F

File PE Metadata
Compilation timestamp:
4/25/2014 7:58:16 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
12288:AMKMxKOU2lU7LXCl8EzBbjEtyYRHQQsfs1v18:PNB2XX1FwQsfs1m

Entry address:
0x567F

Entry point:
E8, 73, 2C, 00, 00, E9, 39, FE, FF, FF, 55, 8B, EC, 83, 7D, 08, 00, 74, 2D, FF, 75, 08, 6A, 00, FF, 35, 78, CB, 42, 00, FF, 15, 6C, D0, 41, 00, 85, C0, 75, 18, 56, E8, 09, 0D, 00, 00, 8B, F0, FF, 15, 50, D0, 41, 00, 50, E8, 54, 0D, 00, 00, 59, 89, 06, 5E, 5D, C3, 55, 8B, EC, 56, 8B, 75, 0C, 57, 33, FF, 85, F6, 74, 1B, 6A, E0, 33, D2, 58, F7, F6, 3B, 45, 10, 73, 0F, E8, D6, 0C, 00, 00, C7, 00, 0C, 00, 00, 00, 33, C0, EB, 3C, 0F, AF, 75, 10, 53, 8B, 5D, 08, 85, DB, 74, 09, 53, E8, C6, 13, 00, 00, 59, 8B, F8...
 
[+]

Code size:
108.5 KB (111,104 bytes)

The file java.exe has been seen being distributed by the following URL.

Remove java.exe - Powered by Reason Core Security