jfilemanager.exe

Tuguu S.L.U.

The Tuguu download and install manager uses the DomalIQ installer to bundle additional adware offers such as toolbars and browser extensions during the setup process. This software distributes modified installers which are not the same as the original distributed by the author. The application jfilemanager.exe by Tuguu S.L.U has been detected as adware by 33 anti-malware scanners. The program is a setup application that uses the TUGUU DomaIQ Setup installer. During install, it bundles potentially unwanted software on a user's computer at the same time without adequate consent.
Publisher:
Tuguu S.L.U.  (signed and verified)

MD5:
69352b6c706cd490a783901dc7a1a785

SHA-1:
00481c899ef4386456fbf941c08bc5b1bb2ad38a

SHA-256:
c5db8a1271ac4c4d839bd83dcc0494f7ea3e7c4094a8c0423900427faf6710d8

Scanner detections:
33 / 68

Status:
Adware

Explanation:
Uses the DomainIQ download manager to bundle additional potentially unwanted software without adequate consent.

Description:
This is an installer which may bundle legitimate applications with offers for additional 3rd-party applications that may be unwanted by the user. While the installer contains an 'opt-out' feature this is not set be defult and is usually overlooked.

Analysis date:
12/26/2024 5:14:39 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Dropped:Trojan.Generic.10279829
910

Agnitum Outpost
PUA.DomaIQ
7.1.1

AhnLab V3 Security
PUP/Win32.DomaIQ
14.08.08

Avira AntiVirus
APPL/DomaIQ.Gen2
7.11.149.220

avast!
Win32:Installer-U [PUP]
2014.9-140922

AVG
Skodna.Generic_r
2015.0.3388

Bitdefender
Dropped:Trojan.Generic.10279829
1.0.20.1100

Clam AntiVirus
Win.Trojan.Domaiq-26
0.98/19185

Comodo Security
Application.Win32.DMIQ.A
18278

Dr.Web
Trojan.PayInt.4
9.0.1.0220

Emsisoft Anti-Malware
Dropped:Trojan.Generic.10279829
8.14.08.08.10

ESET NOD32
Win32/DomaIQ.AQ (variant)
8.9805

F-Prot
W32/DomaIQ.B.gen
v6.4.7.1.166

F-Secure
Dropped:Trojan.Generic.10279829
11.2014-08-08_6

G Data
Dropped:Trojan.Generic.10279829
14.8.24

herdProtect (fuzzy)
2014.10.8.3

IKARUS anti.virus
Trojan.SuspectCRC
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.177.12095

Kaspersky
not-a-virus:AdWare.Win32.DomaIQ
14.0.0.3435

Malwarebytes
PUP.Optional.BundleInstaller.A
v2014.08.08.10

McAfee
Adware-DomaIQ!BF65E15F636E
5600.7044

MicroWorld eScan
Dropped:Trojan.Generic.10279829
15.0.0.660

NANO AntiVirus
Trojan.Win32.PayInt.crggvo
0.28.0.59911

nProtect
Trojan-Clicker/W32.DomaIQ.490432
14.08.08.01

Panda Antivirus
PUP/MultiToolbar.A
14.08.08.10

Qihoo 360 Security
Malware.QVM10.Gen
1.0.0.1015

Quick Heal
Adware.Domal.A5
8.14.14.00

Reason Heuristics
PUP.TuguuSLU.M
14.8.8.21

Rising Antivirus
PE:PUF.DomaIQ!1.9EEB
23.00.65.14806

Sophos
DomainIQ pay-per install
4.98

Vba32 AntiVirus
BScope.Downware.DomaIQ
3.12.26.0

VIPRE Antivirus
DomaIQ
29242

Zillya! Antivirus
Adware.Lollipop.Win32.90
2.0.0.1789

File size:
478.9 KB (490,432 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
TUGUU DomaIQ Setup

Common path:
C:\users\{user}\downloads\jfilemanager.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
8/27/2013 7:00:00 PM

Valid to:
8/27/2014 6:59:59 PM

Subject:
CN=Tuguu S.L.U., OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Tuguu S.L.U., L=Adeje, S=SANTA CRUZ DE TENERIFE, C=ES

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
21FCDE5EAE401DF690786A73C48E74F8

File PE Metadata
Compilation timestamp:
12/12/2013 4:31:51 AM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
6144:7nR+9bh0kZJbhFsLITO1tFJlpWg4ifEVDJFgRTteh2ltqkCO+yq/glMzx/9TogYy:9kZjFsNz3lpWgDfZrltgO+LEaFT5

Entry address:
0xD141

Entry point:
E8, CB, 63, 00, 00, E9, 78, FE, FF, FF, 6A, 0C, 68, 28, 43, 42, 00, E8, C5, 04, 00, 00, 83, 65, E4, 00, 8B, 75, 08, 3B, 35, 58, A8, 42, 00, 77, 22, 6A, 04, E8, B6, 65, 00, 00, 59, 83, 65, FC, 00, 56, E8, BD, 6D, 00, 00, 59, 89, 45, E4, C7, 45, FC, FE, FF, FF, FF, E8, 09, 00, 00, 00, 8B, 45, E4, E8, D1, 04, 00, 00, C3, 6A, 04, E8, B1, 64, 00, 00, 59, C3, 8B, FF, 55, 8B, EC, 56, 8B, 75, 08, 83, FE, E0, 0F, 87, A1, 00, 00, 00, 53, 57, 8B, 3D, 80, F0, 41, 00, 83, 3D, 1C, A5, 42, 00, 00, 75, 18, E8, 71, 5C, 00...
 
[+]

Entropy:
7.4517

Code size:
119.5 KB (122,368 bytes)

The file jfilemanager.exe has been seen being distributed by the following 2 URLs.

Remove jfilemanager.exe - Powered by Reason Core Security