jvlsetup.exe

Plugin Update SL

This is the Softpulse installer which bundles applications with offers for additional 3rd party software, mostly unwanted adware, and may be installed with minimal consent. The application jvlsetup.exe by Plugin Update SL has been detected as adware by 12 anti-malware scanners. The program is a setup application that uses the Softpulse SoftwareBundler installer. The file has been seen being downloaded from kyle.mxp438.com and multiple other hosts.
Publisher:
Plugin Update SL  (signed and verified)

MD5:
bf3b109265cc8b0488c2c4e8e3a1f994

SHA-1:
e8e0541c0297f9243dc5ed43cf1451183ce2d232

SHA-256:
830d6997109aee2336a1254599a03f791f846d72c014ab05ea795984a746677f

Scanner detections:
12 / 68

Status:
Adware

Explanation:
Uses the DomainIQ download manager to bundle additional potentially unwanted software without adequate consent.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/27/2024 7:09:30 AM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
PUP/Win32.OptimizerPro
2014.07.13

Avira AntiVirus
TR/Dropper.Gen
7.11.30.172

avast!
Win32:SoftPulse-O [PUP]
2014.9-140712

AVG
Generic
2015.0.3415

Dr.Web
Trojan.Packed.28213
9.0.1.05190

ESET NOD32
Win32/SoftPulse.F potentially unwanted application
7.0.302.0

IKARUS anti.virus
PUA.DigiPlug
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.180.12719

NANO AntiVirus
Trojan.Win32.MLW.dcgbac
0.28.0.60698

Reason Heuristics
PUP.Installer.PluginUpdateSL.I
14.7.11.21

Sophos
DomainIQ pay-per install
4.98

VIPRE Antivirus
Threat.4150696
31088

File size:
1.2 MB (1,210,488 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Softpulse SoftwareBundler

Common path:
C:\users\{user}\downloads\jvlsetup.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
6/11/2014 5:00:00 PM

Valid to:
6/12/2015 4:59:59 PM

Subject:
CN=Plugin Update SL, O=Plugin Update SL, L=Guia De Isora, S=Tenerife, C=ES

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
01438AF7C5B708CB0E497C84D028BF72

File PE Metadata
Compilation timestamp:
7/11/2014 4:50:40 AM

OS version:
5.1

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

CTPH (ssdeep):
24576:SUyrumsLQIB+JSZ3FuZMGrU0IzoMn4AADw49N:LyrxyBtkZMGo0IzoM4AyT

Entry address:
0xC4BA

Entry point:
E8, 37, 3B, 00, 00, E9, 39, FE, FF, FF, 8B, 4D, F4, 64, 89, 0D, 00, 00, 00, 00, 59, 5F, 5F, 5E, 5B, 8B, E5, 5D, 51, C3, 8B, 4D, F0, 33, CD, E8, 92, C1, FF, FF, E9, DD, FF, FF, FF, 8B, 4D, EC, 33, CD, E8, 83, C1, FF, FF, E9, CE, FF, FF, FF, 50, 64, FF, 35, 00, 00, 00, 00, 8D, 44, 24, 0C, 2B, 64, 24, 0C, 53, 56, 57, 89, 28, 8B, E8, A1, 78, 62, 44, 00, 33, C5, 50, FF, 75, FC, C7, 45, FC, FF, FF, FF, FF, 8D, 45, F4, 64, A3, 00, 00, 00, 00, C3, 50, 64, FF, 35, 00, 00, 00, 00, 8D, 44, 24, 0C, 2B, 64, 24, 0C, 53...
 
[+]

Entropy:
7.3783

Code size:
146 KB (149,504 bytes)

The file jvlsetup.exe has been seen being distributed by the following 2 URLs.

Remove jvlsetup.exe - Powered by Reason Core Security