Short bio

PUP.Optional.JetMedia is Malwarebytes' detection name for a potentially unwanted program (PUP) that behaves like adware and taregets Windows systems.


service properties

properties of JetMedia service


installed JetMedia

listing for JetMedia in installed Programs and Features

Type and source of infection

Scheduled task JetMedia

Scheduled Task JetMedia


block PUP.Optional.JetMedia

Malwarebytes blocks PUP.Optional.JetMedia


Malwarebytes can detect and remove PUP.Optional.JetMedia without further user interaction.

  1. Please download Malwarebytes to your desktop.
  2. Double-click MBSetup.exe and follow the prompts to install the program.
  3. When your Malwarebytes for Windows installation completes, the program opens to the Welcome to Malwarebytes screen.
  4. Click on the Get started button.
  5. Click Scan to start a Threat Scan.
  6. Click Quarantine to remove the found threats.
  7. Reboot the system if prompted to complete the removal process.

Malwarebytes removal log

A Malwarebytes log of removal will look similar to this:


-Log Details- Scan Date: 7/23/18 Scan Time: 10:00 AM Log File: 6e35d5cf-8e4e-11e8-86cd-00ffdcc6fdfc.json Administrator: Yes

-Software Information- Version: Components Version: 1.0.374 Update Package Version: 1.0.6019 License: Premium

-System Information- OS: Windows 7 Service Pack 1 CPU: x64 File System: NTFS User: {computername}\{username}

-Scan Summary- Scan Type: Threat Scan Scan Initiated By: Manual Result: Completed Objects Scanned: 251248 Threats Detected: 14 Threats Quarantined: 14 Time Elapsed: 3 min, 33 sec

-Scan Options- Memory: Enabled Startup: Enabled Filesystem: Enabled Archives: Enabled Rootkits: Enabled Heuristics: Enabled PUP: Detect PUM: Detect

-Scan Details- Process: 1 PUP.Optional.JetMedia, C:\Program Files\Jetmedia\NativeDesktopMediaService\desktop_media_service.exe, Quarantined, [5319], [506353],1.0.6019

Module: 1 PUP.Optional.JetMedia, C:\Program Files\Jetmedia\NativeDesktopMediaService\desktop_media_service.exe, Quarantined, [5319], [506353],1.0.6019

Registry Key: 4 PUP.Optional.JetMedia, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TREE\Checker64, Quarantined, [5319], [506353],1.0.6019 PUP.Optional.JetMedia, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{01958EA3-6525-415C-9973-DD001445C31B}, Quarantined, [5319], [506353],1.0.6019 PUP.Optional.JetMedia, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\PLAIN\{01958EA3-6525-415C-9973-DD001445C31B}, Quarantined, [5319], [506353],1.0.6019 PUP.Optional.JetMedia, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\NativeDesktopMediaService, Quarantined, [5319], [506353],1.0.6019

Registry Value: 3 PUP.Optional.JetMedia, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\NATIVEDESKTOPMEDIASERVICE|IMAGEPATH, Quarantined, [5319], [506357],1.0.6019 PUP.Optional.JetMedia, HKLM\SOFTWARE\MICROSOFT\WINDOWS NT\CURRENTVERSION\SCHEDULE\TASKCACHE\TASKS\{01958EA3-6525-415C-9973-DD001445C31B}|PATH, Quarantined, [5319], [506358],1.0.6019 Adware.NetAdapter, HKLM\SYSTEM\CURRENTCONTROLSET\SERVICES\SHAREDACCESS\PARAMETERS\FIREWALLPOLICY\FIREWALLRULES|{905D3279-8055-4FCD-8CA1-193C7FCCDDA2}, Quarantined, [912], [509082],1.0.6019

Registry Data: 0 (No malicious items detected)

Data Stream: 0 (No malicious items detected)

Folder: 2 PUP.Optional.JetMedia, C:\Program Files\Jetmedia\NativeDesktopMediaService, Quarantined, [5319], [506353],1.0.6019 PUP.Optional.JetMedia, C:\PROGRAM FILES\JETMEDIA, Quarantined, [5319], [506353],1.0.6019

File: 3 PUP.Optional.JetMedia, C:\WINDOWS\SYSTEM32\TASKS\Checker64, Quarantined, [5319], [506353],1.0.6019 PUP.Optional.JetMedia, C:\PROGRAM FILES\JETMEDIA\NATIVEDESKTOPMEDIASERVICE\checker.exe, Quarantined, [5319], [506353],1.0.6019 PUP.Optional.JetMedia, C:\Program Files\Jetmedia\NativeDesktopMediaService\desktop_media_service.exe, Quarantined, [5319], [506353],1.0.6019

Physical Sector: 0 (No malicious items detected)

WMI: 0 (No malicious items detected)


Add an exclusion

Should users wish to keep this program and exclude it from being detected in future scans, they can add the program to the exclusions list. Here’s how to do it.

  • Open Malwarebytes for Windows.
  • Click the Detection History
  • Click the Allow List
  • To add an item to the Allow List, click Add.
  • Select the exclusion type Allow a file or folder and use the Select a folder button to select the main folder for the software that you wish to keep.
  • Repeat this for any secondary files or folder(s) that belong to the software.
If you want to allow the program to connect to the Internet, for example to fetch updates, also add an exclusion of the type Allow an application to connect to the internet and use the Browse button to select the file you wish to grant access.


You may see these entries in FRST logs:

() C:\Program Files\Jetmedia\NativeDesktopMediaService\desktop_media_service.exe
R2 NativeDesktopMediaService; C:\Program Files\Jetmedia\NativeDesktopMediaService\desktop_media_service.exe
() C:\Users\{username}\AppData\Roaming\Jetmedia

NativeDesktopMediaService (HKLM\...\{7AE7827C-57AB-4A9E-A598-8D8142D28EB3}) (Version: 2.1.5 - Jetmedia) Task: {2EC83B2D-069B-4112-B4F0-F8A750C143C4} - System32\Tasks\Checker64 => C:\Program Files\Jetmedia\NativeDesktopMediaService\checker.exe [2018-01-31] ()

Select your language

New Buy Online Partner Icon Warning Icon