java.exe

Payments Interactive SL

This is the Tuguu DomaIQ download manager which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application java.exe by Payments Interactive SL has been detected as adware by 32 anti-malware scanners. The program is a setup application that uses the TUGUU DomaIQ Setup installer. During install, it bundles potentially unwanted software on a user's computer at the same time without adequate consent. With this installer, users are expecting to download the free Oracle Java Runtime but before that occurs they may be presented with additional offers, mostly potentially unwanted software or adware.
Publisher:
Payments Interactive SL  (signed and verified)

MD5:
fc7aa6c6d445ca939e2eb3fa145cab38

SHA-1:
2aba5f928b67c2bfed87dd9b8ac5af2b76c4d816

SHA-256:
342023ea610808fc0444c4fdd388c211781128590d8e6d264977a2a5668dcb11

Scanner detections:
32 / 68

Status:
Adware

Explanation:
May bundle additional potentially unwanted software such as adware during setup.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/24/2024 10:53:56 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Bundler.DomaIQ.Q
870

Agnitum Outpost
PUA.Lollipop
7.1.1

AhnLab V3 Security
PUP/Win32.DomaIQ
14.09.17

Avira AntiVirus
APPL/DomaIQ.Gen
7.11.149.250

avast!
Win32:DomaIQ-CC [PUP]
2014.9-140917

AVG
DomaIQ
2015.0.3348

Bitdefender
Gen:Variant.Application.Bundler.DomaIQ.8
1.0.20.1300

Clam AntiVirus
Win.Adware.Agent-6648
0.98/21411

Comodo Security
Application.Win32.DomaIQ.CC
18282

Dr.Web
Trojan.Packed.26717
9.0.1.0260

Emsisoft Anti-Malware
Application.Bundler.DomaIQ.Q
8.14.09.17.12

ESET NOD32
Win32/DomaIQ.BB (variant)
8.9807

F-Prot
W32/A-a5c7fcdf
v6.4.7.1.166

F-Secure
Gen:Variant.Application.Bundler
11.2014-17-09_4

G Data
Gen:Variant.Application.Bundler.DomaIQ
14.9.24

herdProtect (fuzzy)
2014.11.21.5

IKARUS anti.virus
AdWare.DomaIQ
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.177.12101

Kaspersky
not-a-virus:AdWare.MSIL.DomaIQ
14.0.0.3237

Malwarebytes
PUP.Optional.BundleInstaller.A
v2014.09.17.02

McAfee
PUP-FJV!3B9644E73D2A
5600.7004

Microsoft Security Essentials
Threat.Undefined
1.183.2533.0

MicroWorld eScan
Gen:Variant.Application.Bundler.DomaIQ.8
15.0.0.780

NANO AntiVirus
Riskware.Win32.Lollipop.czamxj
0.28.2.62151

Panda Antivirus
PUP/MultiToolbar.A
14.09.17.02

Quick Heal
Adware.DomaIQ.BT5
9.14.14.00

Reason Heuristics
PUP.PaymentsInteractiveSL.E
14.9.17.12

Rising Antivirus
PE:Malware.DomaIQ!6.1977
23.00.65.14915

Sophos
Generic PUA KD
4.98

SUPERAntiSpyware
PUP.DomaIQ/Variant
10354

VIPRE Antivirus
Trojan.Win32.Generic
29262

Zillya! Antivirus
Adware.DomaIQ.Win32.264
2.0.0.1925

File size:
483.5 KB (495,112 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
TUGUU DomaIQ Setup

Common path:
C:\users\{user}\downloads\java.exe

Digital Signature
Authority:
GoDaddy.com, Inc.

Valid from:
12/5/2013 3:09:43 PM

Valid to:
12/5/2014 3:09:43 PM

Subject:
CN=Payments Interactive SL, O=Payments Interactive SL, L=Adeje, S=Santa cruz de Tenerife, C=ES

Issuer:
SERIALNUMBER=07969287, CN=Go Daddy Secure Certification Authority, OU=http://certificates.godaddy.com/repository, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US

Serial number:
4EAD03AB9EAF7D

File PE Metadata
Compilation timestamp:
5/8/2014 10:31:13 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
6144:DWRaLyP7muHusP03zuO4sk08lj5R6WnFNVwhDtHbuKRF7LbPdQ0O4YO:DfyPauHusmzcTVoRHq0F7VQ0Oi

Entry address:
0x3EFF

Entry point:
E8, 49, 2D, 00, 00, E9, 39, FE, FF, FF, E9, 74, 13, 00, 00, 3B, 0D, 20, 72, 42, 00, 75, 02, F3, C3, E9, 75, 36, 00, 00, CC, CC, CC, 57, 56, 8B, 74, 24, 10, 8B, 4C, 24, 14, 8B, 7C, 24, 0C, 8B, C1, 8B, D1, 03, C6, 3B, FE, 76, 08, 3B, F8, 0F, 82, 68, 03, 00, 00, 0F, BA, 25, 6C, 9A, 42, 00, 01, 73, 07, F3, A4, E9, 17, 03, 00, 00, 81, F9, 80, 00, 00, 00, 0F, 82, CE, 01, 00, 00, 8B, C7, 33, C6, A9, 0F, 00, 00, 00, 75, 0E, 0F, BA, 25, 28, 72, 42, 00, 01, 0F, 82, DA, 04, 00, 00, 0F, BA, 25, 6C, 9A, 42, 00, 00, 0F...
 
[+]

Code size:
107.5 KB (110,080 bytes)

The file java.exe has been seen being distributed by the following URL.

Remove java.exe - Powered by Reason Core Security