jvlsetup.exe

Plugin Update SL

This is the Softpulse installer which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application jvlsetup.exe by Plugin Update SL has been detected as adware by 12 anti-malware scanners. The program is a setup application that uses the Softpulse SoftwareBundler installer. The file has been seen being downloaded from kyle.mxp438.com.
Publisher:
Plugin Update SL  (signed and verified)

MD5:
c0d89ef61fe53448f9c318552129ebe2

SHA-1:
952e83a09f2766857b154cfc5cd678a556b282eb

SHA-256:
a86fac71f2b7845af9c81ac2229b3583e847f2574d5a7aa46b554f1d75d55e29

Scanner detections:
12 / 68

Status:
Adware

Explanation:
Uses the DomainIQ download manager to bundle additional potentially unwanted software without adequate consent.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
12/27/2024 6:36:30 AM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
PUP/Win32.OptimizerPro
2014.07.13

Avira AntiVirus
TR/Dropper.Gen
7.11.30.172

avast!
Win32:SoftPulse-O [PUP]
2014.9-140712

AVG
Generic
2015.0.3415

Dr.Web
Trojan.Packed.28213
9.0.1.05190

ESET NOD32
Win32/SoftPulse.F potentially unwanted application
7.0.302.0

IKARUS anti.virus
PUA.DigiPlug
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.180.12719

NANO AntiVirus
Trojan.Win32.MLW.dcgbac
0.28.0.60698

Reason Heuristics
PUP.Installer.PluginUpdateSL.I
14.7.11.23

Sophos
DomainIQ pay-per install
4.98

VIPRE Antivirus
Threat.4150696
31088

File size:
1.2 MB (1,210,480 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Softpulse SoftwareBundler

Common path:
C:\users\{user}\downloads\jvlsetup.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
6/11/2014 5:00:00 PM

Valid to:
6/12/2015 4:59:59 PM

Subject:
CN=Plugin Update SL, O=Plugin Update SL, L=Guia De Isora, S=Tenerife, C=ES

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
01438AF7C5B708CB0E497C84D028BF72

File PE Metadata
Compilation timestamp:
7/11/2014 4:50:40 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
24576:yUyrumsLQIB+JSZ3FuZMGrU0IzoMn4AADw499:ryrxyBtkZMGo0IzoM4Ayr

Entry address:
0xC4BA

Entry point:
E8, 37, 3B, 00, 00, E9, 39, FE, FF, FF, 8B, 4D, F4, 64, 89, 0D, 00, 00, 00, 00, 59, 5F, 5F, 5E, 5B, 8B, E5, 5D, 51, C3, 8B, 4D, F0, 33, CD, E8, 92, C1, FF, FF, E9, DD, FF, FF, FF, 8B, 4D, EC, 33, CD, E8, 83, C1, FF, FF, E9, CE, FF, FF, FF, 50, 64, FF, 35, 00, 00, 00, 00, 8D, 44, 24, 0C, 2B, 64, 24, 0C, 53, 56, 57, 89, 28, 8B, E8, A1, 78, 62, 44, 00, 33, C5, 50, FF, 75, FC, C7, 45, FC, FF, FF, FF, FF, 8D, 45, F4, 64, A3, 00, 00, 00, 00, C3, 50, 64, FF, 35, 00, 00, 00, 00, 8D, 44, 24, 0C, 2B, 64, 24, 0C, 53...
 
[+]

Entropy:
7.3782

Code size:
146 KB (149,504 bytes)

The file jvlsetup.exe has been seen being distributed by the following URL.

Remove jvlsetup.exe - Powered by Reason Core Security