jvlsetup.exe

Plugin Update SL

This is the Softpulse installer which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application jvlsetup.exe by Plugin Update SL has been detected as adware by 30 anti-malware scanners. The program is a setup application that uses the Softpulse SoftwareBundler installer. This program installs potentially unwanted software on your PC at the same time as the software you are trying to install, without adequate consent. The file has been seen being downloaded from ttb.newallsoft.com and multiple other hosts.
Publisher:
Plugin Update SL  (signed and verified)

MD5:
57a627fc9d270186f63e4db3fed24ad3

SHA-1:
383cff27fac245db920dc8ec1fd8733e37fefa57

SHA-256:
a1a1dba452c8a78dd0373727e21f84325594a0e53cec977e61f0eacad975aed7

Scanner detections:
30 / 68

Status:
Adware

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
11/24/2024 11:41:44 PM UTC  (a few moments ago)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Application.Bundler.AY
6334402

Agnitum Outpost
Riskware.Agent
7.1.1

AhnLab V3 Security
PUP/Win32.OptimizerPro
2015.01.11

Avira AntiVirus
TR/Dropper.Gen
7.11.30.172

avast!
Win32:SoftPulse-AH [PUP]
150101-1

AVG
Dropper.Generic9
2016.0.3233

Bitdefender
Application.Bundler.AY
1.0.20.55

Bkav FE
W32.HfsAdware
1.3.0.6267

Clam AntiVirus
Win.Adware.MultiPlug-31138
0.98/19906

Comodo Security
Application.Win32.SoftPulse.HEYS
20667

Dr.Web
Adware.SoftPules.3, Trojan.Packed.28213
9.0.1.05190

Emsisoft Anti-Malware
Application.Bundler.AY
9.0.0.4799

ESET NOD32
Win32/SoftPulse.H potentially unwanted application
7.0.302.0

Fortinet FortiGate
W32/Buzus.OVQC!tr
1/11/2015

F-Prot
W32/A-93d66bbd
v6.4.7.1.166

F-Secure
Riskware.Application.Bundler.AY
5.13.68

G Data
Application.Bundler.AY
15.1.24

IKARUS anti.virus
PUA.SoftPulse
t3scan.1.8.6.0

Kaspersky
HEUR:Trojan.Win32.Generic
14.0.0.2660

McAfee
Program.Socrydo
16.8.708.2

MicroWorld eScan
Application.Bundler.AY
16.0.0.33

NANO AntiVirus
Trojan.Win32.MLW.dcgbac
0.30.0.64448

Norman
Application.Bundler.AY
03.12.2014 13:20:04

Panda Antivirus
Trj/Genetic.gen
15.01.11.01

Quick Heal
Trojan.Buzus.A4
1.15.14.00

Reason Heuristics
PUP.Installer.PluginUpdateSL.I
15.1.11.0

Sophos
PUA 'SoftPulse' (of type Adware)
5.09

Vba32 AntiVirus
Trojan.Inject
3.12.26.3

VIPRE Antivirus
Threat.4150696
36504

Zillya! Antivirus
Trojan.Inject.Win32.78259
2.0.0.2032

File size:
1.2 MB (1,210,480 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Softpulse SoftwareBundler

Common path:
C:\users\{user}\downloads\jvlsetup.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
6/11/2014 5:00:00 PM

Valid to:
6/12/2015 4:59:59 PM

Subject:
CN=Plugin Update SL, O=Plugin Update SL, L=Guia De Isora, S=Tenerife, C=ES

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
01438AF7C5B708CB0E497C84D028BF72

File PE Metadata
Compilation timestamp:
7/11/2014 4:50:40 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
24576:yUyrumsLQIB+JSZ3FuZMGrU0IzoMn4AADw49x:ryrxyBtkZMGo0IzoM4Ay3

Entry address:
0xC4BA

Entry point:
E8, 37, 3B, 00, 00, E9, 39, FE, FF, FF, 8B, 4D, F4, 64, 89, 0D, 00, 00, 00, 00, 59, 5F, 5F, 5E, 5B, 8B, E5, 5D, 51, C3, 8B, 4D, F0, 33, CD, E8, 92, C1, FF, FF, E9, DD, FF, FF, FF, 8B, 4D, EC, 33, CD, E8, 83, C1, FF, FF, E9, CE, FF, FF, FF, 50, 64, FF, 35, 00, 00, 00, 00, 8D, 44, 24, 0C, 2B, 64, 24, 0C, 53, 56, 57, 89, 28, 8B, E8, A1, 78, 62, 44, 00, 33, C5, 50, FF, 75, FC, C7, 45, FC, FF, FF, FF, FF, 8D, 45, F4, 64, A3, 00, 00, 00, 00, C3, 50, 64, FF, 35, 00, 00, 00, 00, 8D, 44, 24, 0C, 2B, 64, 24, 0C, 53...
 
[+]

Entropy:
7.3783

Code size:
146 KB (149,504 bytes)

The file jvlsetup.exe has been seen being distributed by the following 2 URLs.

Remove jvlsetup.exe - Powered by Reason Core Security