java.exe

Payments Interactive SL

This is the Tuguu DomaIQ download manager which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application java.exe by Payments Interactive SL has been detected as adware by 26 anti-malware scanners. The program is a setup application that uses the TUGUU DomaIQ Setup installer. During install, it bundles potentially unwanted software on a user's computer at the same time without adequate consent. With this installer, users are expecting to download the free Oracle Java Runtime but before that occurs they may be presented with additional offers, mostly potentially unwanted software or adware.
Publisher:
Payments Interactive SL  (signed and verified)

MD5:
743fec31a32bc592a080711c4ab9e279

SHA-1:
ac2d1eb1f369c537cf847b1331124d1f8ed6bc1a

SHA-256:
60254957f83da78bbe326dc875770495f4c117e6a6b1f5b7e3dead9ff135dee3

Scanner detections:
26 / 68

Status:
Adware

Explanation:
Uses the DomainIQ download manager to bundle additional potentially unwanted software without adequate consent.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/26/2024 9:48:26 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Application.Bundler.DomaIQ.3
1008

Agnitum Outpost
PUA.DomaIQ
7.1.1

AhnLab V3 Security
PUP/Win32.DomaIQ
14.05.02

Avira AntiVirus
APPL/DomaIQ.Gen
7.11.146.224

avast!
Win32:PUP-gen [PUP]
2014.9-140502

AVG
Skodna.Bundle_r.Y
2015.0.3486

Bitdefender
Gen:Variant.Application.Bundler.DomaIQ.3
1.0.20.610

Comodo Security
Application.Win32.DomaIQ.URT
18206

Dr.Web
Trojan.DownLoader9.21779
9.0.1.0122

ESET NOD32
Win32/DomaIQ.AZ (variant)
8.9752

F-Prot
W32/DomaIQ.D.gen
v6.4.7.1.166

F-Secure
Adware:W32/DomaIQ
11.2014-02-05_6

G Data
Gen:Variant.Application.Bundler.DomaIQ
14.5.24

IKARUS anti.virus
AdWare.DomaIQ
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.177.11965

Kaspersky
not-a-virus:AdWare.MSIL.DomaIQ
14.0.0.3926

Malwarebytes
PUP.Optional.BundleInstaller.A
v2014.05.02.08

McAfee
Adware-DomaIQ!87EAB94F6E66
5600.7142

MicroWorld eScan
Gen:Variant.Application.Bundler.DomaIQ.3
15.0.0.366

NANO AntiVirus
Trojan.Win32.DomaIQ.ctadmg
0.28.0.59608

Panda Antivirus
PUP/MultiToolbar.A
14.05.02.08

Reason Heuristics
PUP.PaymentsInteractiveSL.E
14.8.7.23

Sophos
DomainIQ pay-per install
4.98

Vba32 AntiVirus
BScope.Downware.DomaIQ
3.12.26.0

VIPRE Antivirus
DomaIQ
28798

Zillya! Antivirus
Adware.DomaIQ.Win32.132
2.0.0.1775

File size:
313 KB (320,512 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
TUGUU DomaIQ Setup

Common path:
C:\users\{user}\downloads\java.exe

Digital Signature
Authority:
GoDaddy.com, Inc.

Valid from:
12/5/2013 6:09:43 AM

Valid to:
12/5/2014 6:09:43 AM

Subject:
CN=Payments Interactive SL, O=Payments Interactive SL, L=Adeje, S=Santa cruz de Tenerife, C=ES

Issuer:
SERIALNUMBER=07969287, CN=Go Daddy Secure Certification Authority, OU=http://certificates.godaddy.com/repository, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US

Serial number:
4EAD03AB9EAF7D

File PE Metadata
Compilation timestamp:
2/6/2014 4:50:03 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
6144:EV24jwnTGLyoE2fsAu6i6xgB1A/QXoCPk96zmu0YjN:EV2mwnTyyoE2fsz6xgBu1CjzN

Entry address:
0x1573

Entry point:
E8, BF, 26, 00, 00, E9, 89, FE, FF, FF, 8B, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A3, D8, CF, 40, 00, 89, 0D, D4, CF, 40, 00, 89, 15, D0, CF, 40, 00, 89, 1D, CC, CF, 40, 00, 89, 35, C8, CF, 40, 00, 89, 3D, C4, CF, 40, 00, 66, 8C, 15, F0, CF, 40, 00, 66, 8C, 0D, E4, CF, 40, 00, 66, 8C, 1D, C0, CF, 40, 00, 66, 8C, 05, BC, CF, 40, 00, 66, 8C, 25, B8, CF, 40, 00, 66, 8C, 2D, B4, CF, 40, 00, 9C, 8F, 05, E8, CF, 40, 00, 8B, 45, 00, A3, DC, CF, 40, 00, 8B, 45, 04, A3, E0, CF, 40, 00, 8D, 45, 08, A3, EC, CF, 40...
 
[+]

Entropy:
5.8894

Code size:
30.5 KB (31,232 bytes)

The file java.exe has been seen being distributed by the following URL.

Remove java.exe - Powered by Reason Core Security