java.exe

Lunacom Interactive Ltd

This is the Tuguu DomaIQ download manager which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application java.exe by Lunacom Interactive has been detected as adware by 34 anti-malware scanners. The program is a setup application that uses the TUGUU DomaIQ Setup installer. This program installs potentially unwanted software on your PC at the same time as the software you are trying to install, without adequate consent. The installer is marketed through download protals and search ads as the free Oracle Java Runtime but will also install additional software offers which include adware, PUPs and browser toolbars.
Publisher:
Lunacom Interactive Ltd  (signed and verified)

MD5:
303f2219eb48b120c2345b7da81b658a

SHA-1:
4c3d0d2b9aa2dd8b481b2f95c55d4b9e91276725

SHA-256:
d6513f7aa23abd303deaac4742813bcdf0cf3a457f277c019e2ccf99a4427e3a

Scanner detections:
34 / 68

Status:
Adware

Explanation:
Uses the DomainIQ download manager to bundle additional potentially unwanted software without adequate consent.

Description:
This is an installer which may bundle legitimate applications with offers for additional 3rd-party applications that may be unwanted by the user. While the installer contains an 'opt-out' feature this is not set be defult and is usually overlooked.

Analysis date:
4/25/2024 2:03:44 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Dropped:Application.Bundler.DomaIQ.Q
6103425

Agnitum Outpost
Adware.DomaIQ
7.1.1

AhnLab V3 Security
PUP/Win32.DomaIQ
2014.12.10

Avira AntiVirus
APPL/DomaIQ.Gen
7.11.194.0

avast!
PUP-gen [PUP]
141130-1

AVG
Adware Skodna.Bundle_r.Q
2014.0.4235

Bitdefender
Dropped:Application.Bundler.DomaIQ.Q
1.0.20.1720

Clam AntiVirus
Win.Trojan.Domaiq-73
0.98/19757

Comodo Security
Application.Win32.DomaIQ.JIK
20321

Dr.Web
Trojan.PayInt.1
9.0.1.05190

Emsisoft Anti-Malware
Dropped:Application.Bundler.DomaIQ.Q
9.0.0.4668

ESET NOD32
Win32/DomaIQ.AN potentially unwanted application
7.0.302.0

Fortinet FortiGate
Adware/DomaIQ
12/10/2014

F-Prot
W32/MSIL_Troj.CL.gen
4.6.5.141

F-Secure
Riskware.Dropped:Application.Bundler.DomaIQ
5.13.68

G Data
Dropped:Application.Bundler.DomaIQ
14.12.24

IKARUS anti.virus
not-a-virus:Downloader.Win32.Agent
t3scan.1.8.5.0

K7 AntiVirus
Unwanted-Program
13.186.14280

Kaspersky
not-a-virus:AdWare.Win32.DomaIQ
15.0.0.543

Malwarebytes
PUP.Optional.Domalq
v2014.12.10.04

McAfee
Program.CryptDomaIQ
16.8.708.2

MicroWorld eScan
Dropped:Application.Bundler.DomaIQ.Q
15.0.0.1032

NANO AntiVirus
Trojan.Win32.PayInt.cqkjts
0.28.6.63850

Norman
Dropped:Application.Bundler.DomaIQ.Q
04.12.2014 14:30:06

nProtect
Trojan-Clicker/W32.DomaIQ.460232
14.12.09.01

Panda Antivirus
PUP/MultiToolbar.A
14.12.10.04

Qihoo 360 Security
Malware.QVM06.Gen
1.0.0.1015

Quick Heal
Adware.Domal.A5
12.14.14.00

Reason Heuristics
PUP.LunacomInteractive.E
14.12.10.4

Rising Antivirus
PE:PUF.DomaIQ!1.9EEB
23.00.65.141208

Sophos
PUA 'DomainIQ pay-per install'
5.08

Vba32 AntiVirus
OScope.Downware.DomaIQ
3.12.26.3

VIPRE Antivirus
Threat.4150696
35418

Zillya! Antivirus
Adware.DomaIQ.Win32.28
2.0.0.2001

File size:
449.4 KB (460,232 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
TUGUU DomaIQ Setup

Common path:
C:\users\{user}\downloads\java.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
10/6/2013 3:00:00 AM

Valid to:
12/6/2014 2:59:59 AM

Subject:
CN=Lunacom Interactive Ltd, OU="Raul Valenberg 6, ", OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Lunacom Interactive Ltd, L=Tel Aviv-Jaffa, S=Israel, C=IL

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
15E496383F5A0396A7AD86D85850D5BB

File PE Metadata
Compilation timestamp:
12/3/2013 8:39:35 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
6144:RSelM67O+qiq2vZvymBvh62W4hPpmM7wyxGV6jQ6100nmK1r8iw49cCiKrYr:kIvZv7h62phxB7wyxGV6Z/4N49cCrk

Entry address:
0xD50B

Entry point:
E8, 9A, 59, 00, 00, E9, 78, FE, FF, FF, 6A, 0C, 68, 40, 34, 42, 00, E8, EB, 22, 00, 00, 83, 65, E4, 00, 8B, 75, 08, 3B, 35, 70, A8, 42, 00, 77, 22, 6A, 04, E8, 85, 5B, 00, 00, 59, 83, 65, FC, 00, 56, E8, 8C, 63, 00, 00, 59, 89, 45, E4, C7, 45, FC, FE, FF, FF, FF, E8, 09, 00, 00, 00, 8B, 45, E4, E8, F7, 22, 00, 00, C3, 6A, 04, E8, 80, 5A, 00, 00, 59, C3, 8B, FF, 55, 8B, EC, 56, 8B, 75, 08, 83, FE, E0, 0F, 87, A1, 00, 00, 00, 53, 57, 8B, 3D, A4, E0, 41, 00, 83, 3D, 1C, 95, 42, 00, 00, 75, 18, E8, 4C, 51, 00...
 
[+]

Entropy:
7.3949

Code size:
113.5 KB (116,224 bytes)

The file java.exe has been seen being distributed by the following 2 URLs.

Remove java.exe - Powered by Reason Core Security