java2runtimeenvironmentj2re-setup.exe

Download Admin

This is the Tightrope WebInstall which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application java2runtimeenvironmentj2re-setup.exe by Download Admin has been detected as adware by 22 anti-malware scanners. The program is a setup application that uses the Tightrope WebInstall installer. This program installs potentially unwanted software on your PC at the same time as the software you are trying to install, without adequate consent. With this installer, users are expecting to download the free Oracle Java Runtime but before that occurs they may be presented with additional offers, mostly potentially unwanted software or adware.
Publisher:
Download Admin  (signed and verified)

MD5:
420c3be98a5cb798c3f405b12774039f

SHA-1:
2efea272870e55a6c8ec588a427d04471bd71349

SHA-256:
a1791a21f7be8fa7edc0fbe53d0c59ae29c9850df8b3ab2458613f968d6c12ec

Scanner detections:
22 / 68

Status:
Adware

Explanation:
Bundles additional software, mostly toolbars and other potentially unwanted applications using the Vittalia monitization installer.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
11/27/2024 2:35:58 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Bundler.I
5632592

Avira AntiVirus
PUA/DownloadAdmin.Gen
8.3.1.6

Arcabit
Application.Bundler.I
1.0.0.425

avast!
Adware-gen [Adw]
150602-1

AVG
Generic
2016.0.3090

Bitdefender
Application.Bundler.I
1.0.20.770

Bkav FE
W32.HfsAdware
1.3.0.6379

Comodo Security
Application.Win32.DownloadAdmin.AGGL
22318

Dr.Web
Trojan.Vittalia.47
9.0.1.05190

Emsisoft Anti-Malware
Application.Bundler
15.06.03

ESET NOD32
Win32/DownloadAdmin.G potentially unwanted application
7.0.302.0

F-Secure
Adware:W32/WebInstallBundle
5.14.151

G Data
Application.Bundler
15.6.25

K7 AntiVirus
Trojan
13.204.16117

Malwarebytes
PUP.Optional.DownloadAdmin
v2015.06.03.02

MicroWorld eScan
Application.Bundler.I
16.0.0.462

NANO AntiVirus
Riskware.Nsis.Downware.dlgjls
0.30.24.1636

Norman
Application.Bundler.I
02.06.2015 14:23:46

Quick Heal
PUA.Downloadad.Gen
6.15.14.00

Reason Heuristics
PUP.Tightrope.Bundler
15.6.2.22

Sophos
PUA 'Download Admin'
5.15

VIPRE Antivirus
Threat.4783369
40786

File size:
612.8 KB (627,456 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Tightrope WebInstall (using Nullsoft Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\java2runtimeenvironmentj2re-setup.exe

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
3/19/2013 5:00:00 PM

Valid to:
5/29/2016 4:59:59 PM

Subject:
CN=Download Admin, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Download Admin, L=SAN FRANCISCO, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
2EEB247A8F9D63D74CE7EF9551E3D401

File PE Metadata
Compilation timestamp:
6/22/2012 11:07:51 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
12288:irdiMybLCUVSG+u46LDu/eoABSafzNsZGwEL:i+bLcG+Ivu9ABrLWZpU

Entry address:
0x333B

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, B0, 73, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, C0, 70, 40, 00, 53, FF, 15, 88, 72, 40, 00, 6A, 08, A3, B8, 3C, 42, 00, E8, 2C, 25, 00, 00, 53, 68, 60, 01, 00, 00, A3, C0, 3B, 42, 00, 8D, 44, 24, 38, 50, 53, 68, 43, 74, 40, 00, FF, 15, 64, 71, 40, 00, 68, 38, 74, 40, 00, 68, C0, 33, 42, 00, E8, 1D, 24, 00, 00, FF, 15, BC, 70, 40, 00, 50, BF, 00, 90, 42, 00, 57, E8, 0B, 24, 00, 00...
 
[+]

Entropy:
7.9691

Packer / compiler:
Nullsoft install system v2.x

Code size:
23 KB (23,552 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to a23-67-250-106.deploy.static.akamaitechnologies.com  (23.67.250.106:80)

TCP (HTTP):
Connects to a1plpkivs-v03.any.prod.ash1.secureserver.net  (72.167.239.239:80)

TCP (HTTP):
Connects to 50.22.63.140-static.reverse.softlayer.com  (50.22.63.140:80)

Remove java2runtimeenvironmentj2re-setup.exe - Powered by Reason Core Security