java_runtime_enviroment_setup.exe

STMSetup

The installer utilizes the installCore download manager which may bundle additional offers for various ad-supported toolbars, extensions and utilities. The application java_runtime_enviroment_setup.exe by STMSetup has been detected as adware by 15 anti-malware scanners. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. The installer is marketed through download protals and search ads as the free Oracle Java Runtime but will also install additional software offers which include adware, PUPs and browser toolbars.
Publisher:
STMSetup  (signed and verified)

MD5:
c1f416ede11dca9446fe46fabc27288a

SHA-1:
957ac26b9e3c70556f029e20736bca85dc946ad7

SHA-256:
de28ac2f2fa416b8e1fbb2de295dfc7f8565ac3fd6ab2bf9c33d62dec78386f3

Scanner detections:
15 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
12/26/2024 1:24:16 AM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
PUP/Win32.InstallCore
2014.11.27

Avira AntiVirus
7.11.189.28

AVG
Generic
2015.0.3278

Dr.Web
Adware.InstallCore.386
9.0.1.05190

ESET NOD32
Win32/InstallCore.QW potentially unwanted application
7.0.302.0

K7 AntiVirus
Unwanted-Program
13.186.14150

Malwarebytes
v2014.11.26.08

NANO AntiVirus
Riskware.Win32.InstallCore.dgyiew
0.28.6.63726

Norman
InstallCore.CERT
11.20141126

Qihoo 360 Security
Malware.QVM06.Gen
1.0.0.1015

Reason Heuristics
PUP.Installer.STMSetup.DD
14.11.26.14

SUPERAntiSpyware
Trojan.Agent/Gen-Cryptor
10213

Vba32 AntiVirus
Malware-Cryptor.InstallCore.gen
3.12.26.3

VIPRE Antivirus
Threat.4150696
35088

File size:
763.3 KB (781,632 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\microsoft\windows\inetcache\ie\{random}\java_runtime_enviroment_setup.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
4/27/2014 8:00:00 PM

Valid to:
4/28/2015 7:59:59 PM

Subject:
CN=STMSetup, O=STMSetup, STREET=28 Lenelblome St., L=Tel-Aviv, S=Israel, PostalCode=651307, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
4CC8AF2C057FC32A3FA7F44EAADD7EEA

File PE Metadata
Compilation timestamp:
6/19/1992 6:22:17 PM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:EavpRwJ8g/199VRJFrA1vJhm0/YQVLnK7EZ5BHq/dTJ4P3VkIXK9F:EavoKif9VfyU0/YQVLnKoqRJ4PlkhF

Entry address:
0x9C40

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, 86, 94, FF, FF, E8, 8D, A6, FF, FF, E8, 1C, A9, FF, FF, E8, 53, C9, FF, FF, E8, 9A, C9, FF, FF, E8, C9, F2, FF, FF, E8, 30, F4, FF, FF, 33, C0, 55, 68, FC, A2, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, C5, A2, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 96, FE, FF, FF, E8, C9, FA, FF, FF, 8D, 55, F0, 33, C0, E8, 83, CF, FF, FF, 8B, 55, F0, B8, 24, CE, 40, 00, E8, 32, 95, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, 24, CE...
 
[+]

Entropy:
7.8581

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
37 KB (37,888 bytes)

Remove java_runtime_enviroment_setup.exe - Powered by Reason Core Security