PUP.Optional.JetMedia is Malwarebytes’ detection name for a potentially unwanted program (PUP) that behaves like adware and taregets Windows systems.
Users of affected machine may notice a service called NativeDesktopMediaService and a listing in the Installed Features and Programs with the same name.
PUP.Optional.JetMedia contacts remote servers to deliver geo-targeted advertisements. It uses both a service and a scheduled task to gain persistence.
PUP.Optional.JetMedia is usually installed by bundlers.
Malwarebytes protects users from PUP.Optional.JetMedia by using real-time protection.
Malwarebytes can detect and remove PUP.Optional.JetMedia without further user interaction.
A Malwarebytes log of removal will look similar to this:
Malwarebytes www.malwarebytes.com -Log Details- Scan Date: 7/23/18 Scan Time: 10:00 AM Log File: 6e35d5cf-8e4e-11e8-86cd-00ffdcc6fdfc.json Administrator: Yes -Software Information- Version: 3.5.1.2522 Components Version: 1.0.374 Update Package Version: 1.0.6019 License: Premium -System Information- OS: Windows 7 Service Pack 1 CPU: x64 File System: NTFS User: {computername}\{username} -Scan Summary- Scan Type: Threat Scan Scan Initiated By: Manual Result: Completed Objects Scanned: 251248 Threats Detected: 14 Threats Quarantined: 14 Time Elapsed: 3 min, 33 sec -Scan Options- Memory: Enabled Startup: Enabled Filesystem: Enabled Archives: Enabled Rootkits: Enabled Heuristics: Enabled PUP: Detect PUM: Detect -Scan Details- Process: 1 PUP.Optional.JetMedia, C:\Program Files\Jetmedia\NativeDesktopMediaService\desktop_media_service.exe, Quarantined, [5319], [506353],1.0.6019 Module: 1 PUP.Optional.JetMedia, C:\Program Files\Jetmedia\NativeDesktopMediaService\desktop_media_service.exe, Quarantined, [5319], [506353],1.0.6019 Registry Key: 4 PUP.Optional.JetMedia, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\Checker64, Quarantined, [5319], [506353],1.0.6019 PUP.Optional.JetMedia, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{01958EA3-6525-415C-9973-DD001445C31B}, Quarantined, [5319], [506353],1.0.6019 PUP.Optional.JetMedia, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\PLAIN\{01958EA3-6525-415C-9973-DD001445C31B}, Quarantined, [5319], [506353],1.0.6019 PUP.Optional.JetMedia, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\NativeDesktopMediaService, Quarantined, [5319], [506353],1.0.6019 Registry Value: 3 PUP.Optional.JetMedia, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\NATIVEDESKTOPMEDIASERVICE|IMAGEPATH, Quarantined, [5319], [506357],1.0.6019 PUP.Optional.JetMedia, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{01958EA3-6525-415C-9973-DD001445C31B}|PATH, Quarantined, [5319], [506358],1.0.6019 Adware.NetAdapter, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{905D3279-8055-4FCD-8CA1-193C7FCCDDA2}, Quarantined, [912], [509082],1.0.6019 Registry Data: 0 (No malicious items detected) Data Stream: 0 (No malicious items detected) Folder: 2 PUP.Optional.JetMedia, C:\Program Files\Jetmedia\NativeDesktopMediaService, Quarantined, [5319], [506353],1.0.6019 PUP.Optional.JetMedia, C:\PROGRAM FILES\JETMEDIA, Quarantined, [5319], [506353],1.0.6019 File: 3 PUP.Optional.JetMedia, C:\WINDOWS\SYSTEM32\TASKS\Checker64, Quarantined, [5319], [506353],1.0.6019 PUP.Optional.JetMedia, C:\PROGRAM FILES\JETMEDIA\NATIVEDESKTOPMEDIASERVICE\checker.exe, Quarantined, [5319], [506353],1.0.6019 PUP.Optional.JetMedia, C:\Program Files\Jetmedia\NativeDesktopMediaService\desktop_media_service.exe, Quarantined, [5319], [506353],1.0.6019 Physical Sector: 0 (No malicious items detected) WMI: 0 (No malicious items detected) (end)
Should users wish to keep this program and exclude it from being detected in future scans, they can add the program to the exclusions list. Here’s how to do it.
If you want to allow the program to connect to the Internet, for example to fetch updates, also add an exclusion of the type Allow an application to connect to the internet and use the Browse button to select the file you wish to grant access.
You may see these entries in FRST logs:
() C:\Program Files\Jetmedia\NativeDesktopMediaService\desktop_media_service.exe R2 NativeDesktopMediaService; C:\Program Files\Jetmedia\NativeDesktopMediaService\desktop_media_service.exe () C:\Users\{username}\AppData\Roaming\Jetmedia NativeDesktopMediaService (HKLM\...\{7AE7827C-57AB-4A9E-A598-8D8142D28EB3}) (Version: 2.1.5 - Jetmedia) Task: {2EC83B2D-069B-4112-B4F0-F8A750C143C4} - System32\Tasks\Checker64 => C:\Program Files\Jetmedia\NativeDesktopMediaService\checker.exe [2018-01-31] ()
Select your language