jv_setup.exe

System Applet

This is published and distributed via an Adknowledge's advertising supported (adware) software installer. The application jv_setup.exe, “System Applet ” by System Applet has been detected as adware by 39 anti-malware scanners. The program is a setup application that uses the Adknowledge Fusion installer. This program installs potentially unwanted software on your PC at the same time as the software you are trying to install, without adequate consent. The file has been seen being downloaded from install.oinstaller2.com and multiple other hosts.
Publisher:
System Applet   (signed by System Applet)

Product:
System Applet

Description:
System Applet

Version:
2.4.8.1

MD5:
83c5773cdb9ce1aedc9ede042fbc06ec

SHA-1:
a07221193040aa9dd81c91e2ea755dcef3bf07bf

SHA-256:
61c9e9b2e86201c006cfcc1827b78b464559cea8ce8cac9b0fdd484d8472f921

Scanner detections:
39 / 68

Status:
Adware

Explanation:
This installer bundles various adware prorgams that may include toolbars and web browser advertising injectors/extensions.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/24/2024 9:29:57 PM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Gen:Variant.Application.Kazy.427497
6458695

Agnitum Outpost
PUA.Downloader
7.1.1

AhnLab V3 Security
2014.07.31

Avira AntiVirus
ADWARE/Adware.Gen7
7.11.165.34

avast!
Win32:PUP-gen [PUP]
150126-0

AVG
Adware AdPlugin.YP
2014.0.4253

Baidu Antivirus
Adware.Win32.iBryte
4.0.3.15127

Bitdefender
Application.Bundler.OptimumInstaller.R
1.0.20.135

Bkav FE
W32.VikesluLTAH.Adware
1.3.0.4959

Clam AntiVirus
Win.Adware.Ibryte-2033
0.98/19981

Comodo Security
Application.Win32.AgentCV.HWYE
19079

Dr.Web
Trojan.DownLoader11.25708
9.0.1.05190

Emsisoft Anti-Malware
Gen:Variant.Application.Kazy.427497
9.0.0.4799

ESET NOD32
Win32/AdWare.iBryte.AW application
7.0.302.0

Fortinet FortiGate
Riskware/IBryte
1/27/2015

F-Prot
W32/DomaIQ.G.gen
v6.4.7.1.166

F-Secure
Riskware.Gen:Variant.Application.Kazy
5.13.68

G Data
Application.Bundler.OptimumInstaller
15.1.24

IKARUS anti.virus
PUA.PremiumInstaller
t3scan.1.6.1.0

K7 AntiVirus
Unwanted-Program
13.182.12926

Kaspersky
not-a-virus:AdWare.Win32.iBryte
15.0.0.543

Malwarebytes
PUP.Optional.iBryte
v2015.01.27.07

McAfee
Artemis!9F3D6B19E1FF
5600.6873

MicroWorld eScan
Application.Bundler.OptimumInstaller.R
16.0.0.81

NANO AntiVirus
Trojan.Win32.Downware.cukphe
0.28.0.59048

Norman
Gen:Variant.Application.Kazy.427497
03.12.2014 13:20:04

nProtect
Trojan/W32.Badur.241952
14.06.27.01

Panda Antivirus
Trj/Genetic.gen
15.01.27.07

Qihoo 360 Security
Win32/Virus.Downloader.dbe
1.0.0.1015

Quick Heal
Adware.iBryte.DK4
1.15.14.00

Reason Heuristics
PUP.Installer.Adknowledge
15.1.27.7

Rising Antivirus
PE:Malware.iBryte!6.14B5
23.00.65.15125

Sophos
PUA 'iBryte Optimum Installer'
5.09

SUPERAntiSpyware
10090

Total Defense
Win32/Tnega.XABfAXD
37.0.10836

Trend Micro House Call
TROJ_GEN.F47V0310
7.2.27

Vba32 AntiVirus
Signed-Adware.iBryte
3.12.26.3

VIPRE Antivirus
Threat.4778314
31208

Zillya! Antivirus
Downloader.Agent.Win32.185015
2.0.0.1790

File size:
62.9 KB (64,376 bytes)

Product version:
2.4.8.1

Copyright:
Copyright (C) System Applet

File type:
Executable application (Win32 EXE)

Bundler/Installer:
Adknowledge Fusion

Language:
English (United States)

Common path:
C:\users\{user}\downloads\jv_setup.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
3/23/2014 8:00:00 PM

Valid to:
3/24/2015 7:59:59 PM

Subject:
CN=System Applet, O=System Applet, STREET="4600 Madison Ave, 10th FL", L=Kansas City, S=Missouri, PostalCode=64112, C=US

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
18FCD6B5EEB5AEC66D0222B5CA1850D9

File PE Metadata
Compilation timestamp:
8/1/2014 1:07:32 PM

OS version:
5.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
9.0

CTPH (ssdeep):
768:0Ol8qd91AKQ1aDI8N/SbkIo+D5hBxKBx+gJUK/5EUhuWKvOvUwp3gg7xRdP+Yq5I:jhdvI8t+kokZOM5fu7OvUwHVRdGjojH

Entry address:
0x609D

Entry point:
E8, 46, 05, 00, 00, E9, 36, FD, FF, FF, 8B, FF, 55, 8B, EC, 81, EC, 28, 03, 00, 00, A3, 08, A2, 40, 00, 89, 0D, 04, A2, 40, 00, 89, 15, 00, A2, 40, 00, 89, 1D, FC, A1, 40, 00, 89, 35, F8, A1, 40, 00, 89, 3D, F4, A1, 40, 00, 66, 8C, 15, 20, A2, 40, 00, 66, 8C, 0D, 14, A2, 40, 00, 66, 8C, 1D, F0, A1, 40, 00, 66, 8C, 05, EC, A1, 40, 00, 66, 8C, 25, E8, A1, 40, 00, 66, 8C, 2D, E4, A1, 40, 00, 9C, 8F, 05, 18, A2, 40, 00, 8B, 45, 00, A3, 0C, A2, 40, 00, 8B, 45, 04, A3, 10, A2, 40, 00, 8D, 45, 08, A3, 1C, A2, 40...
 
[+]

Entropy:
5.8102

Code size:
24 KB (24,576 bytes)

The file jv_setup.exe has been seen being distributed by the following 2 URLs.

Remove jv_setup.exe - Powered by Reason Core Security