j2re-1_4_0_04-windows-i586.exe

Sun Microsystems, Inc.

This is a setup program which is used to install the application. The file has been seen being downloaded from login.oracle.com.
Publisher:
Sun Microsystems, Inc.  (signed and verified)

MD5:
692779517552e02e024e6dc6fed207ad

SHA-1:
bde25b233c4cf227e9d6a7a5a40b30915ca878a7

Scanner detections:
0 / 68

Status:
Clean (as of last analysis)

Analysis date:
4/26/2024 11:52:39 PM UTC  (a few moments ago)

File size:
9 MB (9,391,080 bytes)

File type:
Executable application (Win32 EXE)

Language:
English (United States)

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
6/17/2002 5:30:00 AM

Valid to:
7/1/2003 5:29:59 AM

Subject:
CN="Sun Microsystems, Inc.", OU=Sun Microsystems, OU=Digital ID Class 3 - Microsoft Software Validation v2, O="Sun Microsystems, Inc.", L=Palo Alto, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2001-4 CA, OU=Terms of use at https://www.verisign.com/rpa (c)01, OU=VeriSign Trust Network, O="VeriSign, Inc."

Serial number:
3A08E7152C2695267D45E9412BDAACAB

File PE Metadata
Compilation timestamp:
3/27/2000 11:39:58 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
196608:H8WulRT//7h6t9XyJ+iTpUKMp4V1MgFkBn8wcUypO3gPnQal+OVyqW7:bulRL7hiyJ+VKMDgut8DUyISf7S

Entry address:
0x83F7

Entry point:
55, 8B, EC, 6A, FF, 68, 10, 23, 41, 00, 68, 30, B5, 40, 00, 64, A1, 00, 00, 00, 00, 50, 64, 89, 25, 00, 00, 00, 00, 83, EC, 58, 53, 56, 57, 89, 65, E8, FF, 15, E8, 21, 41, 00, 33, D2, 8A, D4, 89, 15, 30, 53, 41, 00, 8B, C8, 81, E1, FF, 00, 00, 00, 89, 0D, 2C, 53, 41, 00, C1, E1, 08, 03, CA, 89, 0D, 28, 53, 41, 00, C1, E8, 10, A3, 24, 53, 41, 00, 33, F6, 56, E8, E0, 00, 00, 00, 59, 85, C0, 75, 08, 6A, 1C, E8, B0, 00, 00, 00, 59, 89, 75, FC, E8, 11, 2F, 00, 00, FF, 15, EC, 21, 41, 00, A3, E4, 68, 41, 00, E8...
 
[+]

Entropy:
7.9957

Developed / compiled with:
Microsoft Visual C++ v6.0

Code size:
68 KB (69,632 bytes)

The file j2re-1_4_0_04-windows-i586.exe has been seen being distributed by the following URL.