java.exe

Clovermedia SL

This is the Tuguu DomaIQ download manager which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application java.exe by Clovermedia SL has been detected as adware by 36 anti-malware scanners. The program is a setup application that uses the TUGUU DomaIQ Setup installer. This program installs potentially unwanted software on your PC at the same time as the software you are trying to install, without adequate consent. With this installer, users are expecting to download the free Oracle Java Runtime but before that occurs they may be presented with additional offers, mostly potentially unwanted software or adware.
Publisher:
Clovermedia SL  (signed and verified)

MD5:
4239c48f100c31b6cc0641204e73809c

SHA-1:
bf224d4451a7bf0236ef2102073fc2277426905f

SHA-256:
325020967d113981747f996e48a961768446f67fbc282e1a0336fe5abc82172d

Scanner detections:
36 / 68

Status:
Adware

Explanation:
Uses the DomainIQ download manager to bundle additional potentially unwanted software without adequate consent.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/26/2024 12:03:52 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Bundler.DomaIQ.Q
6117202

Agnitum Outpost
PUA.Lollipop
7.1.1

AhnLab V3 Security
PUP/Win32.DomaIQ
2014.12.13

Avira AntiVirus
APPL/DomaIQ.Gen
7.11.194.246

avast!
DomaIQ-CC [PUP]
141130-1

AVG
Adware DomaIQ_r.K
2014.0.4189

Bitdefender
Application.Bundler.DomaIQ.Q
1.0.20.1730

Clam AntiVirus
Win.Adware.Domaiq-65
0.98/21511

Dr.Web
Trojan.DownLoader11.5325
9.0.1.05190

Emsisoft Anti-Malware
Application.Bundler.DomaIQ.Q
9.0.0.4668

ESET NOD32
Win32/DomaIQ.BB potentially unwanted application
7.0.302.0

Fortinet FortiGate
Riskware/Generic.AC.765
12/12/2014

F-Prot
W32/A-8d1b8c90
v6.4.7.1.166

F-Secure
Riskware.Application.Bundler.DomaIQ
5.13.68

G Data
Application.Bundler.DomaIQ
14.12.24

IKARUS anti.virus
AdWare.DomaIQ
t3scan.1.8.5.0

K7 AntiVirus
Unwanted-Program
13.187.14319

Kaspersky
not-a-virus:AdWare.MSIL.DomaIQ
15.0.0.543

Malwarebytes
PUP.Optional.DomaIQ
v2014.12.12.02

McAfee
Program.CryptDomaIQ
16.8.708.2

Microsoft Security Essentials
Threat.Undefined
1.189.1948.0

MicroWorld eScan
Application.Bundler.DomaIQ.Q
15.0.0.1038

NANO AntiVirus
Trojan.Win32.DownLoader11.cziwrs
0.28.6.63850

Norman
Application.Bundler.DomaIQ.Q
04.12.2014 14:30:06

nProtect
Trojan-Clicker/W32.Agent.499184
14.12.12.01

Panda Antivirus
Trj/Genetic.gen
14.12.12.02

Quick Heal
Adware.DomaIQ.BT5
12.14.14.00

Reason Heuristics
PUP.ClovermediaSL.E
14.12.12.13

Rising Antivirus
PE:Malware.Lollipop!6.1932
23.00.65.141210

Sophos
PUA 'DomainIQ pay-per install'
5.08

SUPERAntiSpyware
Adware.Kazy/Variant
10182

Total Defense
Win32/Tnega.CXDdDcB
37.0.11326

Trend Micro House Call
TROJ_DOMAIQ.SMP1
7.2.346

Trend Micro
TROJ_DOMAIQ.SMP1
10.465.12

VIPRE Antivirus
Threat.4150696
35418

Zillya! Antivirus
Adware.DomaIQ.Win32.253
2.0.0.2004

File size:
487.5 KB (499,184 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
TUGUU DomaIQ Setup

Common path:
C:\users\{user}\downloads\java.exe

Digital Signature
Signed by:

Authority:
GlobalSign nv-sa

Valid from:
4/29/2014 1:14:21 PM

Valid to:
4/30/2015 1:14:21 PM

Subject:
E=media@clovermediainter.com, CN=Clovermedia SL, O=Clovermedia SL, S=Tenerife, C=ES

Issuer:
CN=GlobalSign CodeSigning CA - SHA256 - G2, O=GlobalSign nv-sa, C=BE

Serial number:
1121FAB97DC7FB0477755E47A50ECFDC36A0

File PE Metadata
Compilation timestamp:
5/1/2014 9:36:53 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
12288:zeJpjUTGEsiklJWS4gOqN7YoNKJLf2vTMX4wC935Z:opK0RmxfyTMXbC1

Entry address:
0x447B

Entry point:
E8, 7D, 2D, 00, 00, E9, 39, FE, FF, FF, E9, A0, 18, 00, 00, FF, 35, 68, F6, 42, 00, FF, 15, 80, D0, 41, 00, C3, FF, 35, 68, F6, 42, 00, FF, 15, 80, D0, 41, 00, 85, C0, 74, 02, FF, D0, 6A, 19, E8, DA, 24, 00, 00, 6A, 01, 6A, 00, E8, 4C, 36, 00, 00, 83, C4, 0C, E9, 63, 36, 00, 00, 55, 8B, EC, 56, FF, 35, 68, F6, 42, 00, FF, 15, 80, D0, 41, 00, FF, 75, 08, 8B, F0, FF, 15, 7C, D0, 41, 00, A3, 68, F6, 42, 00, 8B, C6, 5E, 5D, C3, 55, 8B, EC, 83, EC, 10, EB, 0D, FF, 75, 08, E8, 6F, 39, 00, 00, 59, 85, C0, 74, 0F...
 
[+]

Entropy:
6.7768

Code size:
112 KB (114,688 bytes)

The file java.exe has been seen being distributed by the following URL.

Remove java.exe - Powered by Reason Core Security