× Cookies are disabled! This site requires cookies to be enabled to work properly
SHA256: 39c13ee490a2c4cf6f3aafe92734edbf2373f25cc6fab8e15cd4cf590f1abdf1
File name: Java(TM) Update Scheduler
Detection ratio: 44 / 56
Analysis date: 2015-01-08 13:03:36 UTC ( 1 month, 3 weeks ago )
Antivirus Result Update
ALYac Gen:Variant.Zusy.82171 20150108
AVG Agent4.BVJA.dropper 20150108
AVware Trojan.Win32.Generic!BT 20150108
Ad-Aware Gen:Variant.Zusy.82171 20150108
Agnitum Trojan.Jinupd! 20150107
AhnLab-V3 Trojan/Win32.Jackpos 20150108
Antiy-AVL Trojan[:HEUR]/Win32.AGeneric 20150108
Avast Win32:Malware-gen 20150108
Avira TR/Rogue.1561491 20150108
Baidu-International Trojan.Win32.Jinupd.BB 20150108
BitDefender Gen:Variant.Zusy.82171 20150108
CAT-QuickHeal Trojan.Jusp.r3 20150108
Comodo UnclassifiedMalware 20150108
DrWeb Trojan.DownLoader9.22804 20150108
ESET-NOD32 a variant of Win32/Jinupd.B 20150108
Emsisoft Trojan.Win32.Jinupd (A) 20150108
F-Prot W32/Comrerop.A.gen!Eldorado 20150108
F-Secure Gen:Variant.Zusy.82171 20150108
Fortinet W32/Jinupd.B!tr 20150108
GData Gen:Variant.Zusy.82171 20150108
Ikarus Trojan.Win32.Jinupd 20150108
K7AntiVirus Trojan ( 00493c7c1 ) 20150108
K7GW Trojan ( 00493c7c1 ) 20150108
Kaspersky HEUR:Trojan.Win32.Generic 20150108
Malwarebytes Spyware.Password 20150108
McAfee RDN/Generic.dx!c2o 20150108
McAfee-GW-Edition BehavesLike.Win32.YahLover.cc 20150108
MicroWorld-eScan Gen:Variant.Zusy.82171 20150108
Microsoft Trojan:Win32/Jinupd.A 20150108
NANO-Antivirus Trojan.Win32.Siggen6.ctuomf 20150108
Norman Suspicious_Gen4.FUEDV 20150108
Panda Trj/CI.A 20150107
Qihoo-360 Win32/Trojan.e6d 20150108
Rising PE:Trojan.Win32.Generic.166AAF67!376090471 20150108
Sophos Troj/Trackr-AB 20150108
Symantec Infostealer.Jackpos 20150108
Tencent Win32.Trojan.Generic.Edxv 20150108
TheHacker Posible_Worm32 20150106
TrendMicro TROJ_SPNV.01B914 20150108
TrendMicro-HouseCall TSPY_JACKPOS.SM 20150108
VBA32 suspected of Trojan.Downloader.gen.h 20150108
VIPRE Trojan.Win32.Generic!BT 20150108
ViRobot Trojan.Win32.S.Agent.137728.BO[h] 20150108
Zillya Trojan.Jinupd.Win32.16 20150108
AegisLab 20150108
Bkav 20150108
ByteHero 20150108
CMC 20150107
ClamAV 20150108
Cyren 20150108
Jiangmin 20150108
Kingsoft 20150108
SUPERAntiSpyware 20150108
TotalDefense 20150108
Zoner 20150107
nProtect 20150108
The file being studied is a Portable Executable file! More specifically, it is a Win32 EXE file for the Windows GUI subsystem.
Developer metadata
Copyright
Copyright © 2004

Publisher Sun Microsystems, Inc.
Product Java(TM) Platform SE 6 U10
Original name jusched.exe
Internal name Java(TM) Update Scheduler
File version 6.0.100.33
Description Java(TM) Platform SE binary
Packers identified
F-PROT UPX
PEiD UPX 2.90 [LZMA] -> Markus Oberhumer, Laszlo Molnar & John Reiser
PE header basic information
Target machine Intel 386 or later processors and compatible processors
Compilation timestamp 2014-01-26 02:48:42
Link date 3:48 AM 1/26/2014
Entry Point 0x00076A70
Number of sections 3
PE sections
PE imports
RegCloseKey
GetAdaptersInfo
VirtualFree
ExitProcess
VirtualProtect
LoadLibraryA
VirtualAlloc
GetProcAddress
ShellExecuteW
InternetOpenW
Number of PE resources by type
RT_RCDATA 1
RT_VERSION 1
RT_MANIFEST 1
Number of PE resources by language
ENGLISH US 3
ExifTool file metadata
SubsystemVersion
5.1

LinkerVersion
11.0

ImageVersion
0.0

FileSubtype
0

FileVersionNumber
6.0.100.33

UninitializedDataSize
348160

LanguageCode
English (U.S.)

FileFlagsMask
0x003f

CharacterSet
Unicode

InitializedDataSize
4096

FileOS
Windows NT 32-bit

MIMEType
application/octet-stream

LegalCopyright
Copyright 2004

FileVersion
6.0.100.33

TimeStamp
2014:01:26 03:48:42+01:00

FileType
Win32 EXE

PEType
PE32

InternalName
Java(TM) Update Scheduler

FileAccessDate
2015:01:08 14:21:49+01:00

ProductVersion
6.0.100.33

FileDescription
Java(TM) Platform SE binary

OSVersion
5.1

FileCreateDate
2015:01:08 14:21:49+01:00

OriginalFilename
jusched.exe

Subsystem
Windows GUI

MachineType
Intel 386 or later, and compatibles

CompanyName
Sun Microsystems, Inc.

CodeSize
135168

ProductName
Java(TM) Platform SE 6 U10

ProductVersionNumber
6.0.100.33

EntryPoint
0x76a70

ObjectFileType
Executable application

Compressed bundles
File identification
MD5 88e721f62470f8bd267810fbaa29104f
SHA1 ccfc0fa22d1e3feeeabc5ca090b76f58f67edada
SHA256 39c13ee490a2c4cf6f3aafe92734edbf2373f25cc6fab8e15cd4cf590f1abdf1
ssdeep
3072:J5LULMKCWingaIDFMpJBWfevcc7O9it1rJoH87DLXVZLN:J5LULMPDgDDKpJFd7hSH8j

authentihash 7b2cebbd6694aa8d6ea45810351e7c2b9806e5bfe76c3aceb1507c742afc1eb1
imphash ba7a6a30c77e41bcf71c3fcb2a07a857
File size 134.5 KB ( 137728 bytes )
File type Win32 EXE
Magic literal
PE32 executable for MS Windows (GUI) Intel 80386 32-bit

TrID UPX compressed Win32 Executable (42.3%)
Win32 EXE Yoda's Crypter (36.7%)
Win32 Dynamic Link Library (generic) (9.1%)
Win32 Executable (generic) (6.2%)
Generic Win/DOS Executable (2.7%)
Tags
peexe upx

VirusTotal metadata
First submission 2014-02-06 20:49:12 UTC ( 1 year ago )
Last submission 2014-11-06 23:24:08 UTC ( 3 months, 3 weeks ago )
File names 7db503f7890fae61801538d4d9c75f1230db1ed0
Java(TM) Update Scheduler
20172823
88e721f62470f8bd267810fbaa29104f.exe
vti-rescan
output.20172823.txt
39c13ee490a2c4cf6f3aafe92734edbf2373f25cc6fab8e15cd4cf590f1abdf1
0E481C3D.vXE
jusched.exe
sop.exe
Advanced heuristic and reputation engines
ClamAV PUA
Possibly Unwanted Application. While not necessarily malicious, the scanned file presents certain characteristics which depending on the user policies and environment may or may not represent a threat. For full details see: http://www.clamav.net/doc/pua.html .

Symantec reputation Suspicious.Insight
No comments. No VirusTotal Community member has commented on this item yet, be the first one to do so!

Leave your comment...

?
Post comment

You have not signed in. Only registered users can leave comments, sign in and have a voice!

No votes. No one has voted on this item yet, be the first one to do so!