java.exe

Clovermedia SL

This is the Tuguu DomaIQ download manager which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application java.exe by Clovermedia SL has been detected as adware by 29 anti-malware scanners. The program is a setup application that uses the TUGUU DomaIQ Setup installer. According to AVG, this software downloads additional adware offers during setup.
Publisher:
Clovermedia SL  (signed and verified)

MD5:
daff334b51e81215f682179fcf5ae3c9

SHA-1:
957ef3b960dca9c58a302ecfd659c64662aa8241

SHA-256:
e763608bf8e1175c2572c5cec146858259b4ad450696cf448f89bc9fe43c8022

Scanner detections:
29 / 68

Status:
Adware

Explanation:
Uses the DomainIQ download manager to bundle additional potentially unwanted software without adequate consent.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/23/2024 3:24:53 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Application.Bundler.DomaIQ.12
926

Agnitum Outpost
PUA.DomaIQ
7.1.1

AhnLab V3 Security
PUP/Win32.DomaIQ
2014.07.24

Avira AntiVirus
APPL/DomaIQ.Gen
7.11.163.178

avast!
DomaIQ-CO [PUP]
140617-1

AVG
Trojan horse Downloader.Generic13.CIDW.dropper
2014.0.3986

Bitdefender
Gen:Variant.Application.Bundler.DomaIQ.12
1.0.20.1025

Clam AntiVirus
Win.Adware.Agent-7150
0.98/19168

Comodo Security
Application.Win32.DomaIQ.XFR
18952

Dr.Web
Trojan.BPlug.78
9.0.1.05190

ESET NOD32
Win32/DomaIQ.BI potentially unwanted application
7.0.302.0

F-Secure
Gen:Variant.Application.Bundler
11.2014-24-07_5

G Data
Gen:Variant.Application.Bundler.DomaIQ.12
14.7.24

IKARUS anti.virus
PUA.CloverMedia
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.181.12819

Kaspersky
not-a-virus:HEUR:AdWare.MSIL.DomaIQ
14.0.0.3515

Malwarebytes
PUP.Optional.DomaIQ
v2014.07.24.01

McAfee
Adware-DomaIQ
5600.7060

Microsoft Security Essentials
Threat.Undefined
1.179.842.0

MicroWorld eScan
Gen:Variant.Application.Bundler.DomaIQ.12
15.0.0.615

NANO AntiVirus
Riskware.Win32.Generic.dbebaf
0.28.2.60990

Reason Heuristics
PUP.ClovermediaSL.E
14.7.23.20

Rising Antivirus
PE:Trojan.Win32.Generic.16DCFBA2!383581090
23.00.65.14722

Sophos
DomainIQ pay-per install
4.98

SUPERAntiSpyware
Trojan.Agent/Gen-Tugspay
10465

Trend Micro House Call
TROJ_SPNR.15GA14
7.2.205

Trend Micro
TROJ_SPNR.15GA14
10.465.24

Vba32 AntiVirus
AdWare.Lollipop
3.12.26.3

VIPRE Antivirus
Threat.4150696
31208

File size:
283.4 KB (290,176 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
TUGUU DomaIQ Setup

Common path:
C:\users\{user}\downloads\java.exe

Digital Signature
Signed by:

Authority:
GoDaddy.com, Inc.

Valid from:
2/13/2014 4:22:48 AM

Valid to:
2/13/2015 4:22:48 AM

Subject:
CN=Clovermedia SL, O=Clovermedia SL, L=Adeje, S=Santa Cruz de Tenerife, C=ES

Issuer:
CN=Go Daddy Secure Certificate Authority - G2, OU=http://certs.godaddy.com/repository/, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US

Serial number:
281161B1143F2B

File PE Metadata
Compilation timestamp:
6/17/2014 4:17:30 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
6144:RwR5za+HqlckLlSNb8uBaKxW6cG+GF6nTgxYPl:qR5zaoMckLMNGKxW6L+GFwTgyl

Entry address:
0x609F

Entry point:
B8, 6C, EE, 4C, 00, 50, 64, FF, 35, 00, 00, 00, 00, 64, 89, 25, 00, 00, 00, 00, 33, C0, 89, 08, 65, 73, 6F, 6E, 6F, 73, 65, 6C, 6F, 63, 00, C2, 57, 8B, F3, 00, DE, 5C, 15, 60, 5E, 16, BC, C1, D7, 51, 99, 02, DC, C9, FD, 80, B5, BB, A0, 31, 5E, 9C, B6, 03, 10, C2, A4, 38, D3, 1A, E9, 04, 36, 7D, 4F, A9, 99, B3, 7C, 7B, 2D, 2C, 1C, 69, 40, C9, AE, A7, 85, FD, 1A, FB, 0F, A2, E8, 59, 7E, C5, 23, 49, EB, 74, 3B, A3, C5, 20, 2C, E0, CD, 4C, E7, 5B, 7F, AD, A3, 13, B3, BB, FF, 3E, 54, CD, E5, AD, 20, 38, B8, 72...
 
[+]

Entropy:
7.7997  (probably packed)

Code size:
111 KB (113,664 bytes)

Remove java.exe - Powered by Reason Core Security