java.exe

Payments Interactive SL

This is the Tuguu DomaIQ download manager which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application java.exe by Payments Interactive SL has been detected as adware by 35 anti-malware scanners. The program is a setup application that uses the TUGUU DomaIQ Setup installer. During install, it bundles potentially unwanted software on a user's computer at the same time without adequate consent. The installer is marketed through download protals and search ads as the free Oracle Java Runtime but will also install additional software offers which include adware, PUPs and browser toolbars.
Publisher:
Payments Interactive SL  (signed and verified)

MD5:
ad5b32e271d518f9ce08af16ceed83e6

SHA-1:
69ba376e236feb9ba51bfb3a21283acb6ca103b8

SHA-256:
b1db4b64b1e989def60905d41a08ab22424e3423b24b5d76a8f0aad8eb2bbb5b

Scanner detections:
35 / 68

Status:
Adware

Explanation:
Uses the DomainIQ download manager to bundle additional potentially unwanted software without adequate consent.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
4/17/2024 11:30:35 PM UTC  (a few moments ago)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Trojan.Generic.11530025
905

Agnitum Outpost
Adware.DomaIQ
7.1.1

AhnLab V3 Security
PUP/Win32.DomaIQ
2014.09.27

Avira AntiVirus
APPL/DomaIQ.Gen2
7.11.174.236

avast!
Win32:DomaIQ-BO [PUP]
140813-1

AVG
Adware Skodna.Generic_r
2015.0.3383

Bitdefender
Trojan.Generic.11530025
1.0.20.1130

Clam AntiVirus
Win.Adware.Domaiq-13
0.98/19441

Comodo Security
Application.Win32.DMIQ.A
19626

Dr.Web
Trojan.PayInt.4
9.0.1.0226

Emsisoft Anti-Malware
Trojan.Generic.11530025
8.14.08.14.05

ESET NOD32
Win32/DomaIQ.AY.gen potentially unwanted application
8.7.0.302.0

Fortinet FortiGate
Adware/DomaIQ
10/28/2014

F-Prot
W32/A-99153ce2
v6.4.7.1.166

F-Secure
Trojan.Generic.11530025
11.2014-14-08_5

G Data
Trojan.Generic.11530025
14.8.24

herdProtect (fuzzy)
2014.10.28.19

IKARUS anti.virus
AdWare.DomaIQ
t3scan.1.7.5.0

K7 AntiVirus
Trojan
13.183.13504

Kaspersky
not-a-virus:AdWare.Win32.DomaIQ
14.0.0.3408

Malwarebytes
PUP.Optional.BundleInstaller.A
v2014.08.14.08

McAfee
CryptDomaIQ
5600.7039

MicroWorld eScan
Trojan.Generic.11530025
15.0.0.678

NANO AntiVirus
Riskware.Win32.DomaIQ.crbkiq
0.28.2.62286

nProtect
Trojan-Clicker/W32.DomaIQ.519656
14.09.26.01

Panda Antivirus
PUP/MultiToolbar.A
14.08.14.08

Qihoo 360 Security
Malware.QVM10.Gen
1.0.0.1015

Quick Heal
Adware.Domal.A5
8.14.14.00

Reason Heuristics
PUP.PaymentsInteractiveSL.E
14.8.14.5

Rising Antivirus
PE:PUF.DomaIQ!1.9EEB
23.00.65.14812

Sophos
DomainIQ pay-per install
4.98

SUPERAntiSpyware
PUP.DomalIQ/Variant
10272

Vba32 AntiVirus
BScope.Downware.DomaIQ
3.12.26.3

VIPRE Antivirus
Threat.4150696
32938

Zillya! Antivirus
Adware.DomaIQ.Win32.31
2.0.0.1934

File size:
507.6 KB (519,736 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
TUGUU DomaIQ Setup

Common path:
C:\users\{user}\downloads\java.exe

Digital Signature
Authority:
DigiCert Inc

Valid from:
10/15/2013 2:00:00 AM

Valid to:
12/19/2014 1:00:00 PM

Subject:
CN=Payments Interactive SL, O=Payments Interactive SL, L=Puntagorda, S=Santa Cruz de Tenerife / Canarias, C=ES

Issuer:
CN=DigiCert Assured ID Code Signing CA-1, OU=www.digicert.com, O=DigiCert Inc, C=US

Serial number:
060CE3456FDDB3F98DA9EDA1B876842F

File PE Metadata
Compilation timestamp:
12/13/2013 12:55:29 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
12288:HhWGS92iz3lpWgDfZrltgO+LEarjR5vGMZ:ZS9/zDZrltt+Lpr/uO

Entry address:
0xD141

Entry point:
E8, CB, 63, 00, 00, E9, 78, FE, FF, FF, 6A, 0C, 68, 08, 43, 42, 00, E8, C5, 04, 00, 00, 83, 65, E4, 00, 8B, 75, 08, 3B, 35, 58, A8, 42, 00, 77, 22, 6A, 04, E8, B6, 65, 00, 00, 59, 83, 65, FC, 00, 56, E8, BD, 6D, 00, 00, 59, 89, 45, E4, C7, 45, FC, FE, FF, FF, FF, E8, 09, 00, 00, 00, 8B, 45, E4, E8, D1, 04, 00, 00, C3, 6A, 04, E8, B1, 64, 00, 00, 59, C3, 8B, FF, 55, 8B, EC, 56, 8B, 75, 08, 83, FE, E0, 0F, 87, A1, 00, 00, 00, 53, 57, 8B, 3D, 80, F0, 41, 00, 83, 3D, 1C, A5, 42, 00, 00, 75, 18, E8, 71, 5C, 00...
 
[+]

Code size:
119.5 KB (122,368 bytes)

The file java.exe has been seen being distributed by the following URL.

Remove java.exe - Powered by Reason Core Security