icreinstall_javasetup.exe

SuperCool Applications

The installer utilizes InstallCore which may bundle about 3-4 offers for various ad-supported toolbars, extensions and utilities. The application icreinstall_javasetup.exe by SuperCool Applications has been detected as adware by 16 anti-malware scanners. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. With this installer, users are expecting to download the free Oracle Java Runtime but before that occurs they may be presented with additional offers, mostly potentially unwanted software or adware.
Publisher:
SuperCool Applications  (signed and verified)

MD5:
d20e6580127c2a9e803f58ee938cfea9

SHA-1:
cd5218f47866e8a24b4332988acc313b7b455707

SHA-256:
32c0bed9fbc6465278e53d9bed5058476255880135b29cbaa000a7624e1b7785

Scanner detections:
16 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
5/18/2024 5:04:54 AM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
7.11.183.62

AVG
Max Setup
2015.0.3300

Dr.Web
Trojan.MulDrop5.10078
9.0.1.05190

ESET NOD32
Win32/InstallCore.PK potentially unwanted application
7.0.302.0

F-Prot
W32/A-2d45491d
v6.4.7.1.166

IKARUS anti.virus
Trojan.Win32.Badur
t3scan.1.8.3.0

K7 AntiVirus
Unwanted-Program
13.185.13888

Kaspersky
Trojan.Win32.Badur
15.0.0.494

McAfee
CryptInno
5600.6956

NANO AntiVirus
Riskware.Text.Drop.dejcjj
0.28.6.62995

nProtect
Trojan/W32.Badur.697016
14.11.05.01

Reason Heuristics
PUP.Installer.SuperCoolApplications.V
14.11.5.9

Vba32 AntiVirus
3.12.26.3

VIPRE Antivirus
Threat.4150696
34232

Zillya! Antivirus
Adware.InstallCore.Win32.47
2.0.0.1976

File size:
680.7 KB (697,016 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Language:
Language Neutral

Common path:
C:\users\{user}\appdata\local\temp\icreinstall_javasetup.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
8/14/2013 9:00:00 PM

Valid to:
8/15/2014 8:59:59 PM

Subject:
CN=SuperCool Applications, O=SuperCool Applications, STREET=63 Ronthscheld Blvd., L=Tel Aviv, S=Israel, PostalCode=65785, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
7239B70290995A99967AE1DE581942C0

File PE Metadata
Compilation timestamp:
6/19/1992 7:22:17 PM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:ZlFafU8O9QWC0xRDiwY4sQONDbDCHm3yn21OAjXebZ67540qhN+b6SkvOQIBUh4e:ZlFx9Qv64/NQOR3CHKyn21OArebZ61Sc

Entry address:
0x9C40

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, 86, 94, FF, FF, E8, 8D, A6, FF, FF, E8, 1C, A9, FF, FF, E8, BF, A9, FF, FF, E8, 5E, C9, FF, FF, E8, C9, F2, FF, FF, E8, 30, F4, FF, FF, 33, C0, 55, 68, FC, A2, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, C5, A2, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 96, FE, FF, FF, E8, C9, FA, FF, FF, 8D, 55, F0, 33, C0, E8, 83, CF, FF, FF, 8B, 55, F0, B8, 24, CE, 40, 00, E8, 32, 95, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, 24, CE...
 
[+]

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
37 KB (37,888 bytes)

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP):
Connects to os.solvefile.com  (207.189.109.121:80)

TCP (HTTP):
Connects to cdnus.solvefile.com  (207.189.109.121:80)

TCP (HTTP):
Connects to cdneu.webfilescdn.com  (65.254.40.36:80)

Remove icreinstall_javasetup.exe - Powered by Reason Core Security