java_runtime_enviroment_setup.exe

Web Program Application

Advertaizing Grupp

The installer utilizes the installCore download manager which may bundle additional offers for various ad-supported toolbars, extensions and utilities. The application java_runtime_enviroment_setup.exe, “Web Program Application Setup ” by Advertaizing Grupp has been detected as adware by 10 anti-malware scanners. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. With this installer, users are expecting to download the free Oracle Java Runtime but before that occurs they may be presented with additional offers, mostly potentially unwanted software or adware.
Publisher:
CoinisRevShare  (signed by Advertaizing Grupp)

Product:
Web Program Application

Description:
Web Program Application Setup

Version:
1.0.5.a0.1_33270

MD5:
326a8be7aec941b85fd0a6647aec5ed0

SHA-1:
f05e1f0211c5e1db9cfc08f78769ed399b6de5dd

SHA-256:
3b8efd1d7d162a2125a2589e27ed4511269203a8c10c4636f4c4bbdd4b63f75a

Scanner detections:
10 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/25/2024 12:49:14 PM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
PUA/InstallCore.Gen4
7.11.217.28

avast!
Rootkit-gen [Rtk]
2014.9-151104

AVG
Generic
2016.0.2935

Bkav FE
W32.HfsAdware
1.3.0.6379

Dr.Web
Trojan.InstallCore.57
9.0.1.0308

ESET NOD32
Win32/InstallCore.UN potentially unwanted application
9.7.0.302.0

K7 AntiVirus
Trojan
13.202.15554

NANO AntiVirus
Riskware.Win32.InstallCore.dqfxtu
0.30.10.952

Reason Heuristics
PUP.installCore.AdvertaizingGrupp.Installer (M)
15.11.4.16

VIPRE Antivirus
Threat.4150696
38950

File size:
842.3 KB (862,496 bytes)

Product version:
2.8

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\java_runtime_enviroment_setup.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
1/12/2015 7:00:00 PM

Valid to:
1/13/2016 6:59:59 PM

Subject:
CN=Advertaizing Grupp, O=Advertaizing Grupp, POBox=117405, STREET="ULITsA DOROZhNAYa,60B", L=GOROD MOSKVA, S=Russia, PostalCode=117405, C=RU

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
230735435EBA58ABD22B8151728C3636

File PE Metadata
Compilation timestamp:
6/19/1992 6:22:17 PM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
24576:XCvGFyjGMA9M16UVV6AusntQEDXKRUIF4B5Q9w3q:XCGFyJ19u7EDKOQ9Eq

Entry address:
0x9C40

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, 86, 94, FF, FF, E8, 8D, A6, FF, FF, E8, 1C, A9, FF, FF, E8, 53, C9, FF, FF, E8, 9A, C9, FF, FF, E8, C9, F2, FF, FF, E8, 30, F4, FF, FF, 33, C0, 55, 68, FC, A2, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, C5, A2, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 96, FE, FF, FF, E8, C9, FA, FF, FF, 8D, 55, F0, 33, C0, E8, 83, CF, FF, FF, 8B, 55, F0, B8, 24, CE, 40, 00, E8, 32, 95, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, 24, CE...
 
[+]

Entropy:
7.8173

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
37 KB (37,888 bytes)

The file java_runtime_enviroment_setup.exe has been seen being distributed by the following URL.

Remove java_runtime_enviroment_setup.exe - Powered by Reason Core Security