imageeditorsetup.exe

JumpyApps

The file is a bundle distribution and utilizes the installCore download manager to distribute this potentially unwanted software. The application imageeditorsetup.exe by JumpyApps has been detected as adware by 18 anti-malware scanners. The program is a setup application that uses the installCore installer. The setup program uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions.
Publisher:
JumpyApps  (signed and verified)

MD5:
9d986649bd7c246c970c08d39f42f40c

SHA-1:
d7b6c34617396264209928fa5c35994549ec9147

SHA-256:
efab2d1d587a87e7757cfb29df1aee622da533e0fd2e746d85622e016615c278

Scanner detections:
18 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
4/19/2024 4:19:05 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Trojan.Heur.TP.OuZ@bCExvAai
6367737

Avira AntiVirus
7.11.152.208

Bitdefender
Gen:Trojan.Heur.TP.OuZ@bCExvAai
1.0.20.425

Clam AntiVirus
Win.Trojan.Agent-789569
0.98/19811

Dr.Web
Trojan.Packed.25903
9.0.1.085

Emsisoft Anti-Malware
Gen:Trojan.Heur.TP.OuZ@bCExvAai
9.0.0.4799

ESET NOD32
Win32/InstallCore.JN potentially unwanted application
9.7.0.302.0

F-Secure
Gen:Trojan.Heur.TP.OuZ@bCExvAai
5.13.68

G Data
Win32.Application.InstallCore
15.3.24

herdProtect (fuzzy)
2015.7.1.3

K7 AntiVirus
Unwanted-Program
13.183.13432

Malwarebytes
v2015.03.26.09

MicroWorld eScan
Gen:Trojan.Heur.TP.OuZ@bCExvAai
16.0.0.255

Norman
Gen:Trojan.Heur.TP.OuZ@bCExvAai
03.12.2014 13:20:04

Reason Heuristics
PUP.Bundler.ironSource
15.3.26.10

Vba32 AntiVirus
Malware-Cryptor.General.3
3.12.26.3

VIPRE Antivirus
Threat.4786018
29800

Zillya! Antivirus
Downloader.FakeNSIS.Win32.17
2.0.0.1942

File size:
642.6 KB (658,056 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
installCore (using Nullsoft Install System)

Common path:
C:\users\{user}\downloads\imageeditorsetup.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
2/18/2013 1:00:00 AM

Valid to:
2/19/2014 12:59:59 AM

Subject:
CN=JumpyApps, O=JumpyApps, STREET=63 Rothschild Blvd., L=Tel Aviv, S=NA, PostalCode=65785, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
6DB423F9C6473168CF486AAF112EDD5C

File PE Metadata
Compilation timestamp:
5/20/2013 1:53:02 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:b2N+5tLtKGluYnXonqEJucIcLMRmLBOnJX6wMV1t/5+uoGOLgjAslcM5sDe:yNKtK+uYn4w5uLBOn7Qj/E2YKZ5sD

Entry address:
0x310B

Entry point:
81, EC, 84, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 1C, C7, 44, 24, 10, 90, 91, 40, 00, 89, 5C, 24, 18, C6, 44, 24, 14, 20, FF, 15, 34, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 8C, 72, 40, 00, 6A, 08, A3, 58, EC, 42, 00, E8, 6E, 2D, 00, 00, A3, A4, EB, 42, 00, 53, 8D, 44, 24, 38, 68, 60, 01, 00, 00, 50, 53, 68, E0, 8F, 42, 00, FF, 15, 64, 71, 40, 00, 68, 80, 91, 40, 00, 68, A0, E3, 42, 00, E8, 18, 2A, 00, 00, FF, 15, 1C, 71, 40, 00, BD, 00, 40, 43, 00, 50, 55, E8, 06, 2A...
 
[+]

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

Remove imageeditorsetup.exe - Powered by Reason Core Security