icreinstall_javaruntimeenvironmentsetup.exe

Generic App

Top Balance (New Media Holdings Ltd.)

The installer utilizes InstallCore which may bundle about 3-4 offers for various ad-supported toolbars, extensions and utilities. The application icreinstall_javaruntimeenvironmentsetup.exe, “Generic App Setup ” by Top Balance (New Media Holdings) has been detected as adware by 14 anti-malware scanners. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. With this installer, users are expecting to download the free Oracle Java Runtime but before that occurs they may be presented with additional offers, mostly potentially unwanted software or adware.
Publisher:
Installer Application   (signed by Top Balance (New Media Holdings Ltd.))

Product:
Generic App

Description:
Generic App Setup

Version:
1.1.3.6

MD5:
4708676476bea45cf3552ce459f1bda5

SHA-1:
eaef4de7e226ca3681d83aaf137f92d6f63a5e99

SHA-256:
f9586cd5ba70a58a1a497c64f9f2c74ea48ad645f64255c5165d59acdf3c7858

Scanner detections:
14 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/18/2024 6:02:50 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.InstallCore
7.1.1

AhnLab V3 Security
PUP/Win32.InstallCore
2015.05.11

Avira AntiVirus
3.6.1.96

avast!
Malware-gen
2014.9-150330

AVG
Generic
2016.0.3153

Bkav FE
W32.HfsAdware
1.3.0.6379

Comodo Security
Application.Win32.InstallCore.DJL
22069

Dr.Web
Trojan.InstallCore.152
9.0.1.089

ESET NOD32
Win32/InstallCore.XX potentially unwanted (variant)
9.11605

K7 AntiVirus
Adware
13.203.15861

NANO AntiVirus
Riskware.Win32.InstallCore.dqvwrd
0.30.24.1357

Reason Heuristics
PUP.Installer.NewMedia.Installer
15.3.30.2

VIPRE Antivirus
Threat.4786018
39486

File size:
759.4 KB (777,584 bytes)

Product version:
1.6

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Language:
Language Neutral

Common path:
C:\Documents and Settings\{user}\Local settings\temp\icreinstall_javaruntimeenvironmentsetup.exe

Digital Signature
Authority:
GlobalSign nv-sa

Valid from:
2/11/2015 6:54:46 PM

Valid to:
2/12/2016 6:54:46 PM

Subject:
CN=Top Balance (New Media Holdings Ltd.), O=Top Balance (New Media Holdings Ltd.), L=Tel Aviv, C=IL

Issuer:
CN=GlobalSign CodeSigning CA - G2, O=GlobalSign nv-sa, C=BE

Serial number:
112195E753935A102CF246567B961877F414

File PE Metadata
Compilation timestamp:
6/20/1992 1:22:17 AM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:c37Go45TpApNOQKOIdUDE1/jIBDzg5bSaWzEjrLWgYzUUHGYydcyAN1wYSTWqUV2:c37pMbQKZ1L6CM4agYXHGTdcr1wYSTRR

Entry address:
0xA5F8

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, CE, 8A, FF, FF, E8, D5, 9C, FF, FF, E8, 64, 9F, FF, FF, E8, 07, A0, FF, FF, E8, A6, BF, FF, FF, E8, 11, E9, FF, FF, E8, 78, EA, FF, FF, 33, C0, 55, 68, C9, AC, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, 92, AC, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 26, F5, FF, FF, E8, 11, F1, FF, FF, 80, 3D, 34, B2, 40, 00, 00, 74, 0C, E8, 23, F6, FF, FF, 33, C0, E8, C4, 97, FF, FF, 8D, 55, F0, 33, C0, E8, B6, C5, FF, FF, 8B, 55...
 
[+]

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
39.5 KB (40,448 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to os.solvefile.com  (207.189.109.121:80)

TCP (HTTP):
Connects to cdnus.solvefile.com  (207.189.109.121:80)

TCP (HTTP):
Connects to cdneu.webfilescdn.com  (65.254.40.36:80)

Remove icreinstall_javaruntimeenvironmentsetup.exe - Powered by Reason Core Security