java_runtime_enviroment_setup.exe

Web Program Application

Advertaizing Grupp

The installer utilizes the installCore download manager which may bundle additional offers for various ad-supported toolbars, extensions and utilities. The application java_runtime_enviroment_setup.exe, “Web Program Application Setup ” by Advertaizing Grupp has been detected as adware by 10 anti-malware scanners. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. With this installer, users are expecting to download the free Oracle Java Runtime but before that occurs they may be presented with additional offers, mostly potentially unwanted software or adware.
Publisher:
CoinisRevShare  (signed by Advertaizing Grupp)

Product:
Web Program Application

Description:
Web Program Application Setup

Version:
1.0.5.a0.1_33270

MD5:
10436f1d6a77f493fbbf561fa9478985

SHA-1:
563e3575317d775bb4003e4c06f7108e26728a11

SHA-256:
74be717e4b92fd913bc402f9c0e7395e7404121c7d8cc22f52030429c30f4349

Scanner detections:
10 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/26/2024 12:01:29 AM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
PUA/InstallCore.Gen4
7.11.217.28

avast!
Rootkit-gen [Rtk]
2014.9-151110

AVG
Generic
2016.0.2930

Bkav FE
W32.HfsAdware
1.3.0.6379

Dr.Web
Trojan.InstallCore.57
9.0.1.0314

ESET NOD32
Win32/InstallCore.UN potentially unwanted application
9.7.0.302.0

K7 AntiVirus
Trojan
13.202.15554

NANO AntiVirus
Riskware.Win32.InstallCore.dqfxtu
0.30.10.952

Reason Heuristics
PUP.installCore.AdvertaizingGrupp.Installer (M)
15.11.10.10

VIPRE Antivirus
Threat.4150696
38950

File size:
842.3 KB (862,496 bytes)

Product version:
2.8

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\java_runtime_enviroment_setup.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
1/12/2015 5:00:00 PM

Valid to:
1/13/2016 4:59:59 PM

Subject:
CN=Advertaizing Grupp, O=Advertaizing Grupp, POBox=117405, STREET="ULITsA DOROZhNAYa,60B", L=GOROD MOSKVA, S=Russia, PostalCode=117405, C=RU

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
230735435EBA58ABD22B8151728C3636

File PE Metadata
Compilation timestamp:
6/19/1992 4:22:17 PM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
24576:9CvGFyjGMA9M16UVV6AusntQEDXKRUIF4B5Q9w3q:9CGFyJ19u7EDKOQ9Eq

Entry address:
0x9C40

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, 86, 94, FF, FF, E8, 8D, A6, FF, FF, E8, 1C, A9, FF, FF, E8, 53, C9, FF, FF, E8, 9A, C9, FF, FF, E8, C9, F2, FF, FF, E8, 30, F4, FF, FF, 33, C0, 55, 68, FC, A2, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, C5, A2, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 96, FE, FF, FF, E8, C9, FA, FF, FF, 8D, 55, F0, 33, C0, E8, 83, CF, FF, FF, 8B, 55, F0, B8, 24, CE, 40, 00, E8, 32, 95, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, 24, CE...
 
[+]

Entropy:
7.8173

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
37 KB (37,888 bytes)

The file java_runtime_enviroment_setup.exe has been seen being distributed by the following URL.

Remove java_runtime_enviroment_setup.exe - Powered by Reason Core Security