java.exe

Java

Download Manager

This is part of the Air Installer, a download manager which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application java.exe, “Java ” by Download Manager has been detected as adware by 31 anti-malware scanners. The program is a setup application that uses the AirInstaller Download Manager installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. The installer is marketed through download protals and search ads as the free Oracle Java Runtime but will also install additional software offers which include adware, PUPs and browser toolbars.
Publisher:
Download Manager   (signed by Download Manager)

Product:
Java

Description:
Java

Version:
2.0.4.71

MD5:
54091a5ac66101b0fc990a8366597780

SHA-1:
1c045705715adbb69bed006824630f92224afc0d

SHA-256:
917584541419a8a18a19dd4464927516194d412a0ab550f7e16802dc4a15edb5

Scanner detections:
31 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
4/24/2024 9:56:10 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Bundler.L
928

Agnitum Outpost
PUA.AirAdInstaller
7.1.1

AhnLab V3 Security
PUP/Win32.AirAdInstaller
14.07.21

Avira AntiVirus
ADWARE/Adware.Gen
7.11.145.120

avast!
Win32:PUP-gen [PUP]
2014.9-140721

AVG
Adware InstallCore.QR
2014.0.3986

Bitdefender
Application.Bundler.L
1.0.20.1010

Bkav FE
HW32.CDB
1.3.0.4959

Clam AntiVirus
Win.Adware.Airadinstaller-41
0.98/19073

Comodo Security
Application.Win32.AirAdInstaller.B
18179

Dr.Web
Trojan.SMSSend.4733
9.0.1.05190

ESET NOD32
Win32/AirAdInstaller.A potentially unwanted application
7.0.302.0

F-Prot
W32/AirInstall.A8.gen
v6.4.7.1.166

F-Secure
Application.Bundler.L
11.2014-21-07_2

G Data
Win32.Adware.Airadinstaller
14.7.24

IKARUS anti.virus
AdWare.Airinstall
t3scan.2.2.29

K7 AntiVirus
Adware
13.175.11028

Kaspersky
not-a-virus:AdWare.Win32.AirAdInstaller
14.0.0.3440

Malwarebytes
PUP.Optional.AirAdInstaller
v2014.07.21.08

MicroWorld eScan
Application.Bundler.L
15.0.0.606

NANO AntiVirus
Riskware.Win32.AirAdInstaller.cwwsgi
0.28.0.60253

nProtect
Trojan-Clicker/W32.AirAdInstaller.824744
14.03.17.01

Panda Antivirus
Trj/Genetic.gen
14.07.21.08

Qihoo 360 Security
Malware.QVM18.Gen
1.0.0.1015

Quick Heal
Adware.AirAdInstaller.C5
8.14.14.00

Reason Heuristics
PUP.Installer.DownloadManager.E
14.8.7.23

Rising Antivirus
PE:PUF.Airinstall!1.9C4C
23.00.65.14719

Sophos
AirInstaller
4.98

Vba32 AntiVirus
AdWare.AirAdInstaller
3.12.24.3

VIPRE Antivirus
Iminent
28648

Zillya! Antivirus
Adware.AirAdInstaller.Win32.112
2.0.0.1821

File size:
840.4 KB (860,584 bytes)

Product version:
2.0.4.71

Copyright:
(c) Download Manager

Original file name:
setup.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
AirInstaller Download Manager

Language:
English (United States)

Common path:
C:\users\{user}\downloads\java.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
6/7/2013 8:00:00 PM

Valid to:
6/8/2014 7:59:59 PM

Subject:
CN=Download Manager, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Download Manager, L=Vancouver, S=British Columbia, C=CA

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
428E8B7C1AC548D083F4D3A0C5FDAF4C

File PE Metadata
Compilation timestamp:
1/9/2014 7:31:42 PM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
10.0

CTPH (ssdeep):
24576:43TF63gCL3+KmTw0JtYKDhHfEY/amBmTcGMcrpvu:4Dsall9fEY/amwTBMcrI

Entry address:
0x266D40

Entry point:
60, BE, 00, 40, 5A, 00, 8D, BE, 00, D0, E5, FF, 57, 83, CD, FF, EB, 10, 90, 90, 90, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46, 83, F0, FF, 74, 75, D1, F8, 89...
 
[+]

Entropy:
7.8866

Packer / compiler:
UPX 2.90LZMA]

Code size:
780 KB (798,720 bytes)

The file java.exe has been seen being distributed by the following URL.

Remove java.exe - Powered by Reason Core Security