java_setup.exe

System Applet

This adware bundler is distributed through Adknowledge's advertising supported software managers. The application java_setup.exe, “System Applet ” by System Applet has been detected as adware by 39 anti-malware scanners. The program is a setup application that uses the Adknowledge Fusion installer. This program installs potentially unwanted software on your PC at the same time as the software you are trying to install, without adequate consent. With this installer, users are expecting to download the free Oracle Java Runtime but before that occurs they may be presented with additional offers, mostly potentially unwanted software or adware.
Publisher:
System Applet   (signed by System Applet)

Product:
System Applet

Description:
System Applet

Version:
2.4.8.1

MD5:
1280c2f755d1bcc0742c055f925955c5

SHA-1:
7d9cb23b1df9e97f86e26de5dba4f30aae8ff66f

SHA-256:
21195597b37ebb32780647af54c0ff1a166a92c94554ba4016446104f14d4374

Scanner detections:
39 / 68

Status:
Adware

Explanation:
This installer bundles various adware prorgams that may include toolbars and web browser advertising injectors/extensions.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/26/2024 11:18:40 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Bundler.Agent.B
355

Agnitum Outpost
PUA.Agent
7.1.1

AhnLab V3 Security
16.02.15

Avira AntiVirus
Adware/iBryte.M
7.11.164.86

avast!
Win32:IBryte-DS [PUP]
2014.9-160215

AVG
AdPlugin
2017.0.2833

Baidu Antivirus
Adware.Win32.iBryte
4.0.3.16215

Bitdefender
Application.Bundler.Agent.B
1.0.20.230

Bkav FE
W32.VikesluLTAH.Adware
1.3.0.4959

Clam AntiVirus
Win.Trojan.Agent-747976
0.98/21411

Comodo Security
Application.Win32.AgentCV.HWYE
19012

Dr.Web
Adware.Downware.6397
9.0.1.046

Emsisoft Anti-Malware
Gen:Variant.Adware.Graftor.145314
8.16.02.15.04

ESET NOD32
Win32/AdWare.iBryte.AT
10.10170

Fortinet FortiGate
Riskware/IBryte
2/15/2016

F-Prot
W32/A-c255719d
v6.4.7.1.166

F-Secure
Application.Bundler.Agent
11.2016-15-02_2

G Data
Win32.Adware.Ibryte
16.2.24

IKARUS anti.virus
PUA.PremiumInstaller
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.177.12013

Kaspersky
not-a-virus:AdWare.Win32.iBryte
14.0.0.659

Malwarebytes
PUP.Optional.iBryte
v2016.02.15.04

McAfee
GenericATG-FGI!02EC0BDF7C3C
5600.6489

MicroWorld eScan
Application.Bundler.Agent.B
17.0.0.138

NANO AntiVirus
Trojan.Win32.Buzus.dcvnql
0.28.2.61148

Norman
IBryte.PDB
11.20160215

nProtect
Adware.IBryte.Y
14.08.05.01

Panda Antivirus
Trj/Genetic.gen
16.02.15.04

Qihoo 360 Security
Malware.QVM10.Gen
1.0.0.1015

Quick Heal
TrojanDownloader.Badur.A5
2.16.14.00

Reason Heuristics
PUP.Adknowledge.Bundler (M)
16.2.15.4

Rising Antivirus
PE:Malware.iBryte!6.192B
23.00.65.16213

Total Defense
Win32/Tnega.XABfAXD
37.0.10836

Trend Micro House Call
TROJ_GEN.F47V0310
7.2.46

Vba32 AntiVirus
3.12.26.0

VIPRE Antivirus
Optimum Installer
31718

Zillya! Antivirus
Adware.iBryte.Win32.854
2.0.0.1790

File size:
62.9 KB (64,376 bytes)

Product version:
2.4.8.1

Copyright:
Copyright (C) System Applet

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Adknowledge Fusion

Language:
English (United States)

Common path:
C:\users\{user}\downloads\java_setup.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
3/23/2014 9:00:00 PM

Valid to:
3/24/2015 8:59:59 PM

Subject:
CN=System Applet, O=System Applet, STREET="4600 Madison Ave, 10th FL", L=Kansas City, S=Missouri, PostalCode=64112, C=US

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
18FCD6B5EEB5AEC66D0222B5CA1850D9

File PE Metadata
Compilation timestamp:
8/1/2014 2:07:32 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
768:DOl8qd91AKQ1aDI8N/SbkIo+D5hBxKBx+gJUK/5EUhuWKvOvUwp3ggEdP+Yq5Qoh:+hdvI8t+kokZOM5fu7OvUwHEdGjMIl

Entry address:
0x609D

Entry point:
E8, 46, 05, 00, 00, E9, 36, FD, FF, FF, 8B, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A3, 08, A2, 40, 00, 89, 0D, 04, A2, 40, 00, 89, 15, 00, A2, 40, 00, 89, 1D, FC, A1, 40, 00, 89, 35, F8, A1, 40, 00, 89, 3D, F4, A1, 40, 00, 66, 8C, 15, 20, A2, 40, 00, 66, 8C, 0D, 14, A2, 40, 00, 66, 8C, 1D, F0, A1, 40, 00, 66, 8C, 05, EC, A1, 40, 00, 66, 8C, 25, E8, A1, 40, 00, 66, 8C, 2D, E4, A1, 40, 00, 9C, 8F, 05, 18, A2, 40, 00, 8B, 45, 00, A3, 0C, A2, 40, 00, 8B, 45, 04, A3, 10, A2, 40, 00, 8D, 45, 08, A3, 1C, A2, 40...
 
[+]

Code size:
24 KB (24,576 bytes)

The file java_setup.exe has been seen being distributed by the following URL.

Remove java_setup.exe - Powered by Reason Core Security