java_runtime_enviroment_setup.exe

Web Program Application

Advertaizing Grupp

The installer utilizes the installCore download manager which may bundle additional offers for various ad-supported toolbars, extensions and utilities. The application java_runtime_enviroment_setup.exe, “Web Program Application Setup ” by Advertaizing Grupp has been detected as adware by 10 anti-malware scanners. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. With this installer, users are expecting to download the free Oracle Java Runtime but before that occurs they may be presented with additional offers, mostly potentially unwanted software or adware.
Publisher:
CoinisRevShare  (signed by Advertaizing Grupp)

Product:
Web Program Application

Description:
Web Program Application Setup

Version:
1.0.5.a0.1_33270

MD5:
04bfd9739e0b762c70c174d7e2edd08d

SHA-1:
1daed9e5f8fe7b58a234410855e13909f80137b9

SHA-256:
1561f743680fe5e2b5a557aa45c536be5305b68d3939e0a58706c71ec3015cfd

Scanner detections:
10 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/25/2024 11:59:29 PM UTC  (a few moments ago)

Scan engine
Detection
Engine version

Avira AntiVirus
PUA/InstallCore.Gen4
7.11.217.28

avast!
Rootkit-gen [Rtk]
2014.9-151221

AVG
Generic
2016.0.2888

Bkav FE
W32.HfsAdware
1.3.0.6379

Dr.Web
Trojan.InstallCore.57
9.0.1.0355

ESET NOD32
Win32/InstallCore.UN potentially unwanted application
9.7.0.302.0

K7 AntiVirus
Trojan
13.202.15554

NANO AntiVirus
Riskware.Win32.InstallCore.dqfxtu
0.30.10.952

Reason Heuristics
PUP.installCore.AdvertaizingGrupp.Installer (M)
15.12.21.14

VIPRE Antivirus
Threat.4150696
38950

File size:
842.3 KB (862,496 bytes)

Product version:
2.8

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\java_runtime_enviroment_setup.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
1/12/2015 5:00:00 PM

Valid to:
1/13/2016 4:59:59 PM

Subject:
CN=Advertaizing Grupp, O=Advertaizing Grupp, POBox=117405, STREET="ULITsA DOROZhNAYa,60B", L=GOROD MOSKVA, S=Russia, PostalCode=117405, C=RU

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
230735435EBA58ABD22B8151728C3636

File PE Metadata
Compilation timestamp:
6/19/1992 4:22:17 PM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
24576:pCvGFyjGMA9M16UVV6AusntQEDXKRUIF4B5Q9w3q:pCGFyJ19u7EDKOQ9Eq

Entry address:
0x9C40

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, 86, 94, FF, FF, E8, 8D, A6, FF, FF, E8, 1C, A9, FF, FF, E8, 53, C9, FF, FF, E8, 9A, C9, FF, FF, E8, C9, F2, FF, FF, E8, 30, F4, FF, FF, 33, C0, 55, 68, FC, A2, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, C5, A2, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 96, FE, FF, FF, E8, C9, FA, FF, FF, 8D, 55, F0, 33, C0, E8, 83, CF, FF, FF, 8B, 55, F0, B8, 24, CE, 40, 00, E8, 32, 95, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, 24, CE...
 
[+]

Entropy:
7.8173

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
37 KB (37,888 bytes)

The file java_runtime_enviroment_setup.exe has been seen being distributed by the following URL.

Remove java_runtime_enviroment_setup.exe - Powered by Reason Core Security