java.exe

Setup

Payments Interactive sl

This is the Tuguu DomaIQ download manager which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application java.exe by Payments Interactive sl has been detected as adware by 28 anti-malware scanners. The program is a setup application that uses the TUGUU DomaIQ Setup installer. During install, it bundles potentially unwanted software on a user's computer at the same time without adequate consent. The installer is marketed through download protals and search ads as the free Oracle Java Runtime but will also install additional software offers which include adware, PUPs and browser toolbars.
Publisher:
Tuguu S.L.U  (signed by Payments Interactive sl)

Product:
Setup

Version:
2.0

MD5:
036c7489d36f82bd54e2829a1fb6e87c

SHA-1:
112d31b9410059030a9b3ac848316499bed95309

SHA-256:
c06ac787a62be6d0062827e66a8518a99b41e67934d414e0803cf6fa9d688ea4

Scanner detections:
28 / 68

Status:
Adware

Explanation:
May bundle additional potentially unwanted software such as adware during setup.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
11/30/2024 10:41:52 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Dropped:Adware.Generic.902505
870

Agnitum Outpost
PUA.DomaIQ
7.1.1

Avira AntiVirus
APPL/DomaIQ.Gen
7.11.145.12

avast!
Win32:PUP-gen [PUP]
2014.9-140807

AVG
DomaIQ
2015.0.3389

Bitdefender
Dropped:Adware.Generic.902505
1.0.20.1305

Comodo Security
UnclassifiedMalware
18157

Dr.Web
Trojan.Packed.24553
9.0.1.0219

Emsisoft Anti-Malware
Dropped:Adware.Generic.902505
8.14.09.18.09

ESET NOD32
MSIL/DomaIQ (variant)
8.9714

Fortinet FortiGate
Adware/Fam.NB
8/7/2014

F-Secure
Adware.Generic.902505
11.2014-18-09_5

G Data
Dropped:Adware.Generic.902505
14.9.24

IKARUS anti.virus
APPL
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.176.11861

Kaspersky
not-a-virus:HEUR:AdWare.MSIL.DomaIQ
14.0.0.3440

Malwarebytes
PUP.Optional.BundleInstaller.A
v2014.08.07.09

McAfee
Artemis!3E3517398CC5
5600.7045

MicroWorld eScan
Dropped:Adware.Generic.902505
15.0.0.783

NANO AntiVirus
Trojan.Win32.DomaIQ.csfkze
0.28.0.59492

nProtect
Dropped:Adware.Generic.902505
14.04.23.01

Panda Antivirus
PUP/MultiToolbar.A
14.08.07.09

Quick Heal
AdWare.MSIL.r3 (Not a Virus)
8.14.14.00

Reason Heuristics
PUP.Installer.PaymentsInteractivesl.E
14.8.7.23

Sophos
Generic PUA BA
4.98

SUPERAntiSpyware
PUP.DomaIQ/Variant
10435

Vba32 AntiVirus
suspected of Trojan.Downloader.gen.h
3.12.26.0

VIPRE Antivirus
DomaIQ
28554

File size:
240.1 KB (245,880 bytes)

Product version:
1.2.2

Copyright:
Tuguu S.L.U

File type:
Executable application (Win32 EXE)

Bundler/Installer:
TUGUU DomaIQ Setup (using Nullsoft Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\java.exe

Digital Signature
Authority:
GoDaddy.com, Inc.

Valid from:
10/9/2012 9:27:23 PM

Valid to:
10/9/2013 4:10:38 PM

Subject:
CN=Payments Interactive sl, O=Payments Interactive sl, L=Puntagorda, S=S.C Tenerife, C=ES

Issuer:
SERIALNUMBER=07969287, CN=Go Daddy Secure Certification Authority, OU=http://certificates.godaddy.com/repository, O="GoDaddy.com, Inc.", L=Scottsdale, S=Arizona, C=US

Serial number:
277606F12C2592

File PE Metadata
Compilation timestamp:
12/5/2009 11:50:46 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
3072:xQIURTXJyq+C0Fa97aejAv7KvlcCI+TNP1POwVsdpEAhiRrxcGp9IF/+l2fggKf+:xsrwIAvefI+TT24iIK8YQEVhHft

Entry address:
0x323C

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 30, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B4, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 58, 3F, 42, 00, E8, 09, 2C, 00, 00, A3, A4, 3E, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 58, F4, 41, 00, FF, 15, 58, 71, 40, 00, 68, B8, 91, 40, 00, 68, A0, 36, 42, 00, E8, BC, 28, 00, 00, FF, 15, B0, 70, 40, 00, BF, 00, 90, 42, 00, 50, 57, E8, AA, 28, 00, 00...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The file java.exe has been seen being distributed by the following URL.

Remove java.exe - Powered by Reason Core Security