java_runtime_enviroment_setup.exe

Web Program Application

Advertaizing Grupp

The installer utilizes the installCore download manager which may bundle additional offers for various ad-supported toolbars, extensions and utilities. The application java_runtime_enviroment_setup.exe, “Web Program Application Setup ” by Advertaizing Grupp has been detected as adware by 10 anti-malware scanners. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. With this installer, users are expecting to download the free Oracle Java Runtime but before that occurs they may be presented with additional offers, mostly potentially unwanted software or adware.
Publisher:
CoinisRevShare  (signed by Advertaizing Grupp)

Product:
Web Program Application

Description:
Web Program Application Setup

Version:
1.0.5.a0.1_33270

MD5:
f6930dd46b0ca7d67b3f2145bee2e0ce

SHA-1:
cbde8e28b3668532e8282ffd1b7853a4e1fa4aa0

SHA-256:
a32402936bc796f63ebb351eaa6add27cb28d6e0e273f012d1e91a0bd2029a0f

Scanner detections:
10 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/18/2024 5:13:23 AM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
PUA/InstallCore.Gen4
7.11.217.28

avast!
Rootkit-gen [Rtk]
2014.9-151122

AVG
Generic
2016.0.2918

Bkav FE
W32.HfsAdware
1.3.0.6379

Dr.Web
Trojan.InstallCore.57
9.0.1.0326

ESET NOD32
Win32/InstallCore.UN potentially unwanted application
9.7.0.302.0

K7 AntiVirus
Trojan
13.202.15554

NANO AntiVirus
Riskware.Win32.InstallCore.dqfxtu
0.30.10.952

Reason Heuristics
PUP.installCore.AdvertaizingGrupp.Installer (M)
15.11.22.9

VIPRE Antivirus
Threat.4150696
38950

File size:
842.3 KB (862,496 bytes)

Product version:
2.8

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Inno Setup)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\java_runtime_enviroment_setup.exe

Digital Signature
Authority:
COMODO CA Limited

Valid from:
1/12/2015 7:00:00 PM

Valid to:
1/13/2016 6:59:59 PM

Subject:
CN=Advertaizing Grupp, O=Advertaizing Grupp, POBox=117405, STREET="ULITsA DOROZhNAYa,60B", L=GOROD MOSKVA, S=Russia, PostalCode=117405, C=RU

Issuer:
CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
230735435EBA58ABD22B8151728C3636

File PE Metadata
Compilation timestamp:
6/19/1992 6:22:17 PM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
24576:tCvGFyjGMA9M16UVV6AusntQEDXKRUIF4B5Q9w3q:tCGFyJ19u7EDKOQ9Eq

Entry address:
0x9C40

Entry point:
55, 8B, EC, 83, C4, C4, 53, 56, 57, 33, C0, 89, 45, F0, 89, 45, DC, E8, 86, 94, FF, FF, E8, 8D, A6, FF, FF, E8, 1C, A9, FF, FF, E8, 53, C9, FF, FF, E8, 9A, C9, FF, FF, E8, C9, F2, FF, FF, E8, 30, F4, FF, FF, 33, C0, 55, 68, FC, A2, 40, 00, 64, FF, 30, 64, 89, 20, 33, D2, 55, 68, C5, A2, 40, 00, 64, FF, 32, 64, 89, 22, A1, 14, C0, 40, 00, E8, 96, FE, FF, FF, E8, C9, FA, FF, FF, 8D, 55, F0, 33, C0, E8, 83, CF, FF, FF, 8B, 55, F0, B8, 24, CE, 40, 00, E8, 32, 95, FF, FF, 6A, 02, 6A, 00, 6A, 01, 8B, 0D, 24, CE...
 
[+]

Entropy:
7.8173

Packer / compiler:
Inno Setup v5.x - Installer Maker

Code size:
37 KB (37,888 bytes)

The file java_runtime_enviroment_setup.exe has been seen being distributed by the following URL.

Remove java_runtime_enviroment_setup.exe - Powered by Reason Core Security