jv_setup.exe

System Applet

This is published and distributed via an Adknowledge's advertising supported (adware) software installer. The application jv_setup.exe, “System Applet ” by System Applet has been detected as adware by 40 anti-malware scanners. The program is a setup application that uses the Adknowledge Fusion installer. This program installs potentially unwanted software on your PC at the same time as the software you are trying to install, without adequate consent.
Publisher:
System Applet   (signed by System Applet)

Product:
System Applet

Description:
System Applet

Version:
2.4.8.1

MD5:
61557b0b4d339de0536d303a69e796b9

SHA-1:
0e58b8caceaa350dd75d144af4734426870c0174

SHA-256:
1ea21a8e690b0b68afe06ed090a073aabd7329cd20efc4e46b572070ecedfc8e

Scanner detections:
40 / 68

Status:
Adware

Explanation:
This installer bundles various adware prorgams that may include toolbars and web browser advertising injectors/extensions.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
12/25/2024 11:30:29 PM UTC  (a few moments ago)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Bundler.Agent.B
865

Agnitum Outpost
PUA.Downloader
7.1.1

AhnLab V3 Security
14.09.22

Avira AntiVirus
Adware/iBryte.qoemno
7.11.138.176

avast!
Win32:PUP-gen [PUP]
2014.9-140922

AVG
Adware AdPlugin
2015.0.3343

Baidu Antivirus
Adware.Win32.iBryte
4.0.3.14922

Bitdefender
Application.Bundler.Agent.B
1.0.20.1325

Bkav FE
W32.VikesluLTAH.Adware
1.3.0.4959

Clam AntiVirus
Win.Adware.Ibryte-2033
0.98/19419

Comodo Security
TrojWare.Win32.IBryte.S
17984

Dr.Web
Trojan.DownLoader11.25708
9.0.1.0265

Emsisoft Anti-Malware
Gen:Variant.Application.Kazy.427497
8.14.09.22.07

ESET NOD32
Win32/AdWare.iBryte.AW application
8.7.0.302.0

Fortinet FortiGate
Adware/IBryte
9/22/2014

F-Prot
W32/DomaIQ.G.gen
v6.4.7.1.166

F-Secure
Application.Bundler.Agent
11.2014-22-09_2

G Data
Win32.Application.PremiumInstaller
14.9.24

herdProtect (fuzzy)
2014.12.5.1

IKARUS anti.virus
not-a-virus:Downloader.Win32.Agent
t3scan.2.2.29

K7 AntiVirus
Unwanted-Program
13.176.11663

Kaspersky
not-a-virus:AdWare.Win32.iBryte
14.0.0.3211

Malwarebytes
v2014.09.22.07

McAfee
GenericATG-FGI!3B0404F8E1DE
5600.6999

MicroWorld eScan
Application.Bundler.Agent.B
15.0.0.795

NANO AntiVirus
Trojan.Win32.Downware.cvgamb
0.28.0.58491

Norman
Downloader
11.20140922

nProtect
Trojan/W32.Badur.241952
14.06.27.01

Panda Antivirus
Trj/Genetic.gen
14.09.22.07

Qihoo 360 Security
Malware.QVM10.Gen
1.0.0.1015

Quick Heal
Adware.iBryte.DK4
9.14.14.00

Reason Heuristics
PUP.Installer.SystemApplet.I
14.9.22.19

Rising Antivirus
PE:Malware.iBryte!6.14B5
23.00.65.14920

SUPERAntiSpyware
10343

Total Defense
Win32/Tnega.XABfAXD
37.0.10836

Trend Micro House Call
TROJ_GEN.F47V0310
7.2.338

Vba32 AntiVirus
suspected of Trojan.Downloader.gen.h
3.12.24.3

VIPRE Antivirus
Trojan.Win32.Generic
27698

Zillya! Antivirus
Downloader.Agent.Win32.185140
2.0.0.1773

File size:
62.9 KB (64,376 bytes)

Product version:
2.4.8.1

Copyright:
Copyright (C) System Applet

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Adknowledge Fusion

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\microsoft\windows\inetcache\ie\{random}\jv_setup.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
3/23/2014 8:00:00 PM

Valid to:
3/24/2015 7:59:59 PM

Subject:
CN=System Applet, O=System Applet, STREET="4600 Madison Ave, 10th FL", L=Kansas City, S=Missouri, PostalCode=64112, C=US

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
18FCD6B5EEB5AEC66D0222B5CA1850D9

File PE Metadata
Compilation timestamp:
8/1/2014 1:07:32 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
768:EOl8qd91AKQ1aDI8N/SbkIo+D5hBxKBx+gJUK/5EUhuWKvOvUwp3gghMdP+Yq5lc:ThdvI8t+kokZOM5fu7OvUwHhMdGjXc

Entry address:
0x609D

Entry point:
E8, 46, 05, 00, 00, E9, 36, FD, FF, FF, 8B, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A3, 08, A2, 40, 00, 89, 0D, 04, A2, 40, 00, 89, 15, 00, A2, 40, 00, 89, 1D, FC, A1, 40, 00, 89, 35, F8, A1, 40, 00, 89, 3D, F4, A1, 40, 00, 66, 8C, 15, 20, A2, 40, 00, 66, 8C, 0D, 14, A2, 40, 00, 66, 8C, 1D, F0, A1, 40, 00, 66, 8C, 05, EC, A1, 40, 00, 66, 8C, 25, E8, A1, 40, 00, 66, 8C, 2D, E4, A1, 40, 00, 9C, 8F, 05, 18, A2, 40, 00, 8B, 45, 00, A3, 0C, A2, 40, 00, 8B, 45, 04, A3, 10, A2, 40, 00, 8D, 45, 08, A3, 1C, A2, 40...
 
[+]

Entropy:
5.8106

Code size:
24 KB (24,576 bytes)

Remove jv_setup.exe - Powered by Reason Core Security