imageeditorsetup.exe

JumpyApps

The file is a bundle distribution and utilizes the installCore download manager to distribute this potentially unwanted software. The application imageeditorsetup.exe by JumpyApps has been detected as adware by 16 anti-malware scanners. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions.
Publisher:
JumpyApps  (signed and verified)

MD5:
9ea938e1d330b0d81b3bf98f5564db6d

SHA-1:
4088dd9d707ca4819786e2cebeda8b656249c5e5

SHA-256:
4ff5e2f751e6e050ce81e5bfa13e4d31089adcee6bbfea93666500b4e24d0952

Scanner detections:
16 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
4/16/2024 11:14:37 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Trojan.Heur.TP.OuZ@bCExvAai
6205011

Avira AntiVirus
7.11.165.22

Bitdefender
Gen:Trojan.Heur.TP.OuZ@bCExvAai
1.0.20.1770

Clam AntiVirus
Win.Trojan.Agent-789569
0.98/19811

Dr.Web
Trojan.Packed.25903
9.0.1.05190

Emsisoft Anti-Malware
Gen:Trojan.Heur.TP.OuZ@bCExvAai
9.0.0.4668

ESET NOD32
Win32/InstallCore.JN potentially unwanted application
7.0.302.0

F-Secure
Gen:Trojan.Heur.TP.OuZ@bCExvAai
5.13.68

G Data
Gen:Trojan.Heur.TP.OuZ@bCExvAai
14.12.24

K7 AntiVirus
Unwanted-Program
13.183.13432

Malwarebytes
v2014.12.20.09

MicroWorld eScan
Gen:Trojan.Heur.TP.OuZ@bCExvAai
15.0.0.1062

Norman
Gen:Trojan.Heur.TP.OuZ@bCExvAai
04.12.2014 14:30:06

Reason Heuristics
PUP.Installer.JumpyApps.Q
14.12.20.9

VIPRE Antivirus
Threat.4786018
31208

Zillya! Antivirus
Downloader.FakeNSIS.Win32.17
2.0.0.1942

File size:
642.6 KB (658,056 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Nullsoft Install System)

Common path:
C:\users\{user}\downloads\imageeditorsetup.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
2/18/2013 1:00:00 AM

Valid to:
2/19/2014 12:59:59 AM

Subject:
CN=JumpyApps, O=JumpyApps, STREET=63 Rothschild Blvd., L=Tel Aviv, S=NA, PostalCode=65785, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
6DB423F9C6473168CF486AAF112EDD5C

File PE Metadata
Compilation timestamp:
5/20/2013 1:53:02 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:b2N+5tLtKGluYnXonqEJucIcLMRmLBOnJX6wMV1t/5+uoGOLgjAslcM5sDe:yNKtK+uYn4w5uLBOn7Qj/E2YKZ5sD

Entry address:
0x310B

Entry point:
81, EC, 84, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 1C, C7, 44, 24, 10, 90, 91, 40, 00, 89, 5C, 24, 18, C6, 44, 24, 14, 20, FF, 15, 34, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 8C, 72, 40, 00, 6A, 08, A3, 58, EC, 42, 00, E8, 6E, 2D, 00, 00, A3, A4, EB, 42, 00, 53, 8D, 44, 24, 38, 68, 60, 01, 00, 00, 50, 53, 68, E0, 8F, 42, 00, FF, 15, 64, 71, 40, 00, 68, 80, 91, 40, 00, 68, A0, E3, 42, 00, E8, 18, 2A, 00, 00, FF, 15, 1C, 71, 40, 00, BD, 00, 40, 43, 00, 50, 55, E8, 06, 2A...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

Remove imageeditorsetup.exe - Powered by Reason Core Security