java_setup.cpl

Connector Funnel (Fried Cookie Ltd.)

The Fried Cookie installer utilizes the InstallCore download manager which may bundle additional offers for various ad-supported toolbars, extensions and utilities. The file java_setup.cpl by Connector Funnel (Fried Cookie) has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. The installer is marketed through download protals and search ads as the free Oracle Java Runtime but will also install additional software offers which include adware, PUPs and browser toolbars.
Publisher:
Connector Funnel (Fried Cookie Ltd.)  (signed and verified)

MD5:
d8aeb42cb59b4410a877906363f45a32

SHA-1:
00e2360e7044428d6711d90927ba2afa65da1693

SHA-256:
88726d38a0419525e8e4ac7c3669b1d90918249b2adfe05c81a7275b3e15aa65

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
7/25/2025 10:36:51 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.InstallCore.Installer.Installer (M)
16.2.12.9

File size:
1.2 MB (1,272,256 bytes)

Bundler/Installer:
installCore

Common path:
C:\users\{user}\downloads\java_setup.cpl

Digital Signature
Authority:
GlobalSign nv-sa

Valid from:
2/6/2015 11:05:34 AM

Valid to:
2/7/2016 11:05:34 AM

Subject:
CN=Connector Funnel (Fried Cookie Ltd.), O=Connector Funnel (Fried Cookie Ltd.), L=Tel Aviv, C=IL

Issuer:
CN=GlobalSign CodeSigning CA - G2, O=GlobalSign nv-sa, C=BE

Serial number:
112179A54F51EBE40357D4DB79D45790125F

File PE Metadata
Compilation timestamp:
6/20/1992 12:22:17 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
24576:o9ydi+m2xBdmwFlK7mFZPgHzV8w69HqTLI:rm2bdm+lleH8qf

Entry address:
0x1733E0

Entry point:
80, 7C, 24, 08, 01, 0F, 85, E2, 01, 00, 00, 60, BE, 00, E0, 43, 00, 8D, BE, 00, 30, FC, FF, 57, 83, CD, FF, EB, 0D, 90, 90, 90, 8A, 06, 46, 88, 07, 47, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 72, ED, B8, 01, 00, 00, 00, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, 01, DB, 73, 0B, 75, 28, 8B, 1E, 83, EE, FC, 11, DB, 72, 1F, 48, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C0, EB, D4, 01, DB, 75, 07, 8B, 1E, 83, EE, FC, 11, DB, 11, C9, EB, 52, 31, C9, 83, E8, 03, 72, 11, C1, E0, 08, 8A, 06, 46...
 
[+]

Packer / compiler:
UPX v0.89.6 - v1.02 / v1.05 - v1.22, 0x

Code size:
1.2 MB (1,269,760 bytes)

The file java_setup.cpl has been seen being distributed by the following URL.

Remove java_setup.cpl - Powered by Reason Core Security