java.exe

Payments Interactive sl

This is the Tuguu DomaIQ download manager which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application java.exe by Payments Interactive sl has been detected as adware by 24 anti-malware scanners. The program is a setup application that uses the TUGUU DomaIQ Setup installer. During install, it bundles potentially unwanted software on a user's computer at the same time without adequate consent. The installer is marketed through download protals and search ads as the free Oracle Java Runtime but will also install additional software offers which include adware, PUPs and browser toolbars.
Publisher:
Payments Interactive sl  (signed and verified)

MD5:
eb09dfbbcfc92e841d737e639f0e63f7

SHA-1:
5d7fc124f7a195c46c24386e6aa5b8b8d1466163

SHA-256:
8b66b6ff1f9cbb9f37c3a3e40b75a3d57a05d3eecaa2f95e4d8df5456ab5988a

Scanner detections:
24 / 68

Status:
Adware

Explanation:
Uses the DomainIQ download manager to bundle additional potentially unwanted software without adequate consent.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
4/26/2024 3:15:43 PM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.DomaIQ
7.1.1

AhnLab V3 Security
Win-PUP/DomaIQ.Gen
2015.06.18

Avira AntiVirus
PUA/DomaIQ.Gen
8.3.1.6

avast!
PUP-gen [PUP]
150602-1

AVG
Adware DomaIQ.BK
2015.0.4355

Bkav FE
W32.HfsAdware
1.3.0.6379

Clam AntiVirus
Win.Adware.Domaiq-206
0.98/20576

Comodo Security
Application.Win32.DomaIQ.~LKO
22483

Dr.Web
Trojan.Domaiq.263
9.0.1.05190

ESET NOD32
Win32/DomaIQ.AH potentially unwanted application
7.0.302.0

Fortinet FortiGate
Riskware/DomaIQ.E
6/17/2015

K7 AntiVirus
Unwanted-Program
13.205.16276

Kaspersky
not-a-virus:Downloader.NSIS.DomaIQ
15.0.0.543

Malwarebytes
PUP.OptionalBundleInstaller.A
v2015.06.17.03

McAfee
Trojan.Artemis!A877A3467C58
17.6.569.0

NANO AntiVirus
Riskware.Win32.DomaIQ.cvkxrw
0.30.24.2086

Panda Antivirus
PUP/MultiToolbar.A
15.06.17.03

Quick Heal
Adware.DomaIQ.BA5
6.15.14.00

Reason Heuristics
PUP.Tuguu.Bundler
15.6.17.11

Rising Antivirus
PE:Trojan.Win32.Generic.169CC3FB!379372539
23.00.65.15615

Sophos
PUA 'DomainIQ pay-per install'
5.15

SUPERAntiSpyware
PUP.BundleInstaller/Variant
9808

VIPRE Antivirus
Threat.4150696
40830

Zillya! Antivirus
Backdoor.PePatch.Win32.39440
2.0.0.2231

File size:
561.4 KB (574,856 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
TUGUU DomaIQ Setup (using Nullsoft Install System)

Common path:
C:\users\{user}\downloads\java.exe

Digital Signature
Authority:
GoDaddy.com, Inc.

Valid from:
10/9/2012 12:27:23 PM

Valid to:
10/9/2013 7:10:38 AM

Subject:
CN=Payments Interactive sl, O=Payments Interactive sl, L=Puntagorda, S=S.C Tenerife, C=ES

Issuer:
SERIALNUMBER=07969287, CN=Go Daddy Secure Certification Authority, OU=http://certificates.godaddy.com/repository, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US

Serial number:
277606F12C2592

File PE Metadata
Compilation timestamp:
12/5/2009 2:50:46 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:E8XxtCWqEHmgDae/x1xbFH/+2b8FtV9D6t/Hh/u:E4YWqym6hDHFotals

Entry address:
0x323C

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 30, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B4, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 58, 3F, 42, 00, E8, 09, 2C, 00, 00, A3, A4, 3E, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 58, F4, 41, 00, FF, 15, 58, 71, 40, 00, 68, B8, 91, 40, 00, 68, A0, 36, 42, 00, E8, BC, 28, 00, 00, FF, 15, B0, 70, 40, 00, BF, 00, 90, 42, 00, 50, 57, E8, AA, 28, 00, 00...
 
[+]

Entropy:
7.9511

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The file java.exe has been seen being distributed by the following URL.

Remove java.exe - Powered by Reason Core Security