java.exe

Setup

Payments Interactive sl

This is the Tuguu DomaIQ download manager which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application java.exe by Payments Interactive sl has been detected as adware by 25 anti-malware scanners. The program is a setup application that uses the TUGUU DomaIQ Setup installer. During install, it bundles potentially unwanted software on a user's computer at the same time without adequate consent. With this installer, users are expecting to download the free Oracle Java Runtime but before that occurs they may be presented with additional offers, mostly potentially unwanted software or adware.
Publisher:
Tuguu S.L.U  (signed by Payments Interactive sl)

Product:
Setup

Version:
2.0

MD5:
3c08bac8ffe6703e5db7583e9cab0afa

SHA-1:
eecbeea693fe4d6a4bd0fe78783cd0624f390e5b

SHA-256:
09dd46b0fc6a8ccdcc12c7f722da06aa645a1facd5791ea350347ccd1f6ed613

Scanner detections:
25 / 68

Status:
Adware

Explanation:
May bundle additional potentially unwanted software such as adware during setup.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/23/2024 4:48:40 PM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.DomaIQ
7.1.1

AhnLab V3 Security
PUP/Win32.DomaIQ
2014.11.23

Avira AntiVirus
APPL/DomaIQ.Gen
7.11.188.32

avast!
PUP-gen [PUP]
141119-1

AVG
Adware DomaIQ.BI
2014.0.4189

Comodo Security
UnclassifiedMalware
20160

Dr.Web
Trojan.Packed.24553
9.0.1.05190

ESET NOD32
MSIL/DomaIQ.E potentially unwanted application
7.0.302.0

Fortinet FortiGate
Adware/Fam.NB
11/22/2014

IKARUS anti.virus
PUA.DomaIQ
t3scan.1.8.3.0

K7 AntiVirus
Unwanted-Program
13.185.14098

Kaspersky
not-a-virus:HEUR:AdWare.MSIL.DomaIQ
14.0.0.2909

Malwarebytes
PUP.Optional.BundleInstaller.A
v2014.11.22.06

McAfee
Artemis!3E3517398CC5
5600.6939

NANO AntiVirus
Trojan.Win32.DomaIQ.csfkze
0.28.6.63474

Panda Antivirus
PUP/MultiToolbar.A
14.11.22.06

Quick Heal
AdWare.MSIL.r3 (Not a Virus)
11.14.14.00

Reason Heuristics
PUP.Installer.PaymentsInteractivesl.E
14.11.22.6

Sophos
Generic PUA BA
4.98

SUPERAntiSpyware
PUP.DomaIQ/Variant
10222

Trend Micro House Call
TROJ_GE.F779EE21
7.2.326

Trend Micro
TROJ_GE.F779EE21
10.465.22

Vba32 AntiVirus
suspected of Trojan.Downloader.gen.h
3.12.26.3

VIPRE Antivirus
Threat.4783235
35010

Zillya! Antivirus
Adware.DomaIQ.Win32.279
2.0.0.1990

File size:
240.1 KB (245,864 bytes)

Product version:
1.2.2

Copyright:
Tuguu S.L.U

File type:
Executable application (Win32 EXE)

Bundler/Installer:
TUGUU DomaIQ Setup (using Nullsoft Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\java.exe

Digital Signature
Authority:
GoDaddy.com, Inc.

Valid from:
10/9/2012 9:27:23 PM

Valid to:
10/9/2013 4:10:38 PM

Subject:
CN=Payments Interactive sl, O=Payments Interactive sl, L=Puntagorda, S=S.C Tenerife, C=ES

Issuer:
SERIALNUMBER=07969287, CN=Go Daddy Secure Certification Authority, OU=http://certificates.godaddy.com/repository, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US

Serial number:
277606F12C2592

File PE Metadata
Compilation timestamp:
12/5/2009 11:50:46 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
3072:BQIURTXJyq+C0Fa97aejAv7KvlcCI+TNP1POwVsdpEAhiRrxcGp9IF/+l2fggKfT:BsrwIAvefI+TT24iIK8YQEVhw

Entry address:
0x323C

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 30, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B4, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 58, 3F, 42, 00, E8, 09, 2C, 00, 00, A3, A4, 3E, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 58, F4, 41, 00, FF, 15, 58, 71, 40, 00, 68, B8, 91, 40, 00, 68, A0, 36, 42, 00, E8, BC, 28, 00, 00, FF, 15, B0, 70, 40, 00, BF, 00, 90, 42, 00, 50, 57, E8, AA, 28, 00, 00...
 
[+]

Entropy:
7.8168

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The file java.exe has been seen being distributed by the following URL.

Remove java.exe - Powered by Reason Core Security