imageeditorsetup.exe

JumpyApps

The file is a bundle distribution and utilizes the installCore download manager to distribute this potentially unwanted software. The application imageeditorsetup.exe by JumpyApps has been detected as adware by 17 anti-malware scanners. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions.
Publisher:
JumpyApps  (signed and verified)

MD5:
02ff4c080886eaafe8bb9184e13ae32b

SHA-1:
a0eef53ccdcb1a2a03bea9191f508e4abd68b7a3

SHA-256:
3f9fb0dc30f9dba1982579c7282547efc810263dc865192328f4f23e871a4aeb

Scanner detections:
17 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
4/24/2024 9:42:50 AM UTC  (today)

Scan engine
Detection
Engine version

Avira AntiVirus
7.11.211.248

AVG
Adware InstallCore.CG
2014.0.4257

Comodo Security
Application.Win32.InstallCore.UIJG
21164

Dr.Web
Trojan.Packed.25612
9.0.1.05190

ESET NOD32
Win32/InstallCore.IU potentially unwanted application
7.0.302.0

F-Prot
W32/A-2365d7ab
v6.4.7.1.166

G Data
Win32.Application.InstallCore
15.2.25

K7 AntiVirus
Unwanted-Program
13.197.15042

Malwarebytes
PUP.Optional.JumpyApps.A
v2015.02.21.10

NANO AntiVirus
Trojan.Win32.InstallCore.dmklix
0.30.0.296

Panda Antivirus
Trj/Genetic.gen
15.02.21.10

Reason Heuristics
PUP.Installer.ironSource
15.2.21.22

Rising Antivirus
PE:Malware.XPACK-LNR/Heur!1.5594
23.00.65.15219

Sophos
PUA 'Install Core Click run software'
5.10

Vba32 AntiVirus
3.12.26.3

VIPRE Antivirus
Threat.4786018
37588

Zillya! Antivirus
Trojan.Kryptik.Win32.629944
2.0.0.2077

File size:
670.7 KB (686,832 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore

Common path:
C:\users\{user}\downloads\imageeditorsetup.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
2/18/2013 9:00:00 AM

Valid to:
2/19/2014 8:59:59 AM

Subject:
CN=JumpyApps, O=JumpyApps, STREET=63 Rothschild Blvd., L=Tel Aviv, S=NA, PostalCode=65785, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
6DB423F9C6473168CF486AAF112EDD5C

File PE Metadata
Compilation timestamp:
6/20/1992 7:22:17 AM

OS version:
1.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
12288:Lg3ySl+WiUYTkQcSiaw+ic8ErMog14Ke5VfhUYKyd1ij/fijwU:2ySlJ284MoVVx47fijw

Entry address:
0xBAB4

Entry point:
55, 8B, EC, 83, C4, F4, B8, 54, BA, 40, 00, E8, 70, 96, FF, FF, 68, E0, BA, 40, 00, E8, 72, 97, FF, FF, 68, E0, BA, 40, 00, 6A, 00, E8, 3E, 97, FF, FF, E8, 8D, 75, FF, FF, 00, 64, 73, 61, 64, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
7.8170

Developed / compiled with:
Microsoft Visual C++

Code size:
43 KB (44,032 bytes)

Remove imageeditorsetup.exe - Powered by Reason Core Security