java.exe

Payments Interactive SL

This is the Tuguu DomaIQ download manager which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application java.exe by Payments Interactive SL has been detected as adware by 33 anti-malware scanners. The program is a setup application that uses the TUGUU DomaIQ Setup installer. During install, it bundles potentially unwanted software on a user's computer at the same time without adequate consent. The installer is marketed through download protals and search ads as the free Oracle Java Runtime but will also install additional software offers which include adware, PUPs and browser toolbars.
Publisher:
Payments Interactive SL  (signed and verified)

MD5:
4f7350b33fbb9e7978ea4e69898b1421

SHA-1:
764a38f182d746a6460cabbba8523bb9fb7d0374

SHA-256:
4cdaff8a0429fc89b4aec50adcac763abd906a5a0af032e67b9a4cbeff368678

Scanner detections:
33 / 68

Status:
Adware

Explanation:
Uses the DomainIQ download manager to bundle additional potentially unwanted software without adequate consent.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
4/25/2024 3:03:53 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Dropped:Application.Bundler.DomaIQ.Q
6103425

Agnitum Outpost
Adware.DomaIQ
7.1.1

AhnLab V3 Security
PUP/Win32.DomaIQ
2014.12.10

Avira AntiVirus
APPL/DomaIQ.Gen2
7.11.194.0

avast!
Win32:DomaIQ-BO [PUP]
141130-1

AVG
Adware Skodna.Generic_r.HX
2014.0.4189

Bitdefender
Dropped:Application.Bundler.DomaIQ.Q
1.0.20.1720

Clam AntiVirus
Win.Adware.Domaiq-13
0.98/19757

Comodo Security
Application.Win32.DMIQ.A
20321

Dr.Web
Trojan.PayInt.4
9.0.1.05190

Emsisoft Anti-Malware
Dropped:Application.Bundler.DomaIQ.Q
9.0.0.4668

ESET NOD32
Win32/DomaIQ.AY.gen potentially unwanted application
7.0.302.0

Fortinet FortiGate
Adware/DomaIQ
12/10/2014

F-Prot
W32/A-26c86127
v6.4.7.1.166

F-Secure
Riskware.Dropped:Application.Bundler.DomaIQ
5.13.68

G Data
Dropped:Application.Bundler.DomaIQ
14.12.24

K7 AntiVirus
Unwanted-Program
13.186.14280

Kaspersky
not-a-virus:AdWare.Win32.DomaIQ
15.0.0.543

Malwarebytes
PUP.Optional.BundleInstaller.A
v2014.12.10.05

McAfee
Program.CryptDomaIQ
16.8.708.2

MicroWorld eScan
Dropped:Application.Bundler.DomaIQ.Q
15.0.0.1032

NANO AntiVirus
Riskware.Win32.DomaIQ.crbkiq
0.28.6.63850

Norman
Dropped:Application.Bundler.DomaIQ.Q
04.12.2014 14:30:06

nProtect
Trojan-Clicker/W32.DomaIQ.519736
14.12.09.01

Panda Antivirus
PUP/MultiToolbar.A
14.12.10.05

Qihoo 360 Security
Malware.QVM10.Gen
1.0.0.1015

Quick Heal
Adware.Domal.A5
12.14.14.00

Reason Heuristics
PUP.PaymentsInteractiveSL.E
14.12.10.5

Rising Antivirus
PE:PUF.DomaIQ!1.9EEB
23.00.65.141208

Sophos
PUA 'DomainIQ pay-per install'
5.08

SUPERAntiSpyware
PUP.DomalIQ/Variant
10187

Vba32 AntiVirus
BScope.Downware.DomaIQ
3.12.26.3

VIPRE Antivirus
Threat.4150696
35418

File size:
507.6 KB (519,736 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
TUGUU DomaIQ Setup

Common path:
C:\users\{user}\downloads\java.exe

Digital Signature
Authority:
DigiCert Inc

Valid from:
10/15/2013 2:00:00 AM

Valid to:
12/19/2014 1:00:00 PM

Subject:
CN=Payments Interactive SL, O=Payments Interactive SL, L=Puntagorda, S=Santa Cruz de Tenerife / Canarias, C=ES

Issuer:
CN=DigiCert Assured ID Code Signing CA-1, OU=www.digicert.com, O=DigiCert Inc, C=US

Serial number:
060CE3456FDDB3F98DA9EDA1B876842F

File PE Metadata
Compilation timestamp:
12/13/2013 12:55:29 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
12288:HhWGS92iz3lpWgDfZrltgO+LEarjR5vGG:ZS9/zDZrltt+Lpr/uG

Entry address:
0xD141

Entry point:
E8, CB, 63, 00, 00, E9, 78, FE, FF, FF, 6A, 0C, 68, 08, 43, 42, 00, E8, C5, 04, 00, 00, 83, 65, E4, 00, 8B, 75, 08, 3B, 35, 58, A8, 42, 00, 77, 22, 6A, 04, E8, B6, 65, 00, 00, 59, 83, 65, FC, 00, 56, E8, BD, 6D, 00, 00, 59, 89, 45, E4, C7, 45, FC, FE, FF, FF, FF, E8, 09, 00, 00, 00, 8B, 45, E4, E8, D1, 04, 00, 00, C3, 6A, 04, E8, B1, 64, 00, 00, 59, C3, 8B, FF, 55, 8B, EC, 56, 8B, 75, 08, 83, FE, E0, 0F, 87, A1, 00, 00, 00, 53, 57, 8B, 3D, 80, F0, 41, 00, 83, 3D, 1C, A5, 42, 00, 00, 75, 18, E8, 71, 5C, 00...
 
[+]

Code size:
119.5 KB (122,368 bytes)

The file java.exe has been seen being distributed by the following URL.

Remove java.exe - Powered by Reason Core Security