Skip to main content
Published Mar 11, 2015 | Updated Jul 13, 2016

PUA:Win32/InstallCore

Detected by Microsoft Defender Antivirus

Aliases: not-a-virus:Downloader.Win32.InstallMonster.dpba (Kaspersky) Generic PUP.x (McAfee) Win32/InstallCore.OY potentially unwanted application (ESET) Install Core Click run software (Sophos) ADW_INSTALLCORE (Trend Micro) AdWare.Win32.InstallCore.i (Rising AV) Gen:Variant.Application.InstallCore.1 (BitDefender) Trojan.Gen.2 (Symantec)

Summary

This application was stopped from running on your network because it has a poor reputation. This application can also affect the quality of your computing experience. We have seen this leading to the following potentially unwanted behaviors on PCs:

  • Adds files that run at startup
  • Modifies file associations
  • Injects into other processes on your system
  • Injects into browsers
  • Changes browser settings
  • Changes browser shortcuts
  • Installs browser extensions
  • Disables User Access Control (UAC)

These applications are most commonly software bundlers or installers for applications such as toolbars, adware, or system optimizers. We have observed this application installing software that you might not have intended on your PC.

If you were trying to install an application, you might have downloaded it from a source other than the official product's website.

We usually see this application installed on PCs in the following countries. This list is sorted according to prevalence:

  • United States
  • Brazil
  • France
  • Poland
  • Spain

This detection is part of our extended Potentially Unwanted Application protection feature.

You should contact your IT representative or network administrator to find how you can install legitimate programs while connected to your network.

Follow us