iroot.exe

File

ConfirmEd app NlN

This is the OutBrowse Revenyou installer which bundles offers for additional third party applications that may be unwanted and installed without consent. The application iroot.exe by ConfirmEd app NlN has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the OutBrowse Revenyou installer. The file has been seen being downloaded from get.point0102.info.
Publisher:
ConfirmEd app NlN  (signed and verified)

Product:
File

Version:
1.9.3.0

MD5:
77e1f462a301b8312c8657ff2db84350

SHA-1:
3fb8364346f38c6b9ef69122d4f6bdba31bb78a6

SHA-256:
d47985932bdba88d181b8cc23c42b7f8986193f5c6812ad7ecdf4d05ff30a83c

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
2/25/2025 6:55:46 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
Threat.Outbrowse.Bundler
15.4.24.14

File size:
1 MB (1,100,568 bytes)

Product version:
1.9.3.0

Copyright:
File

Original file name:
Ionic.Zip-2015Apr10-210618-d0373fcd-40a7-4396-9c43-0573bd83deae.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
OutBrowse Revenyou

Language:
Language Neutral

Digital Signature
Authority:
thawte, Inc.

Valid from:
4/8/2015 3:00:00 AM

Valid to:
1/28/2016 1:59:59 AM

Subject:
CN=ConfirmEd app NlN, O=ConfirmEd app NlN, L=Dublin, S=Dublin, C=IE

Issuer:
CN=thawte SHA256 Code Signing CA, O="thawte, Inc.", C=US

Serial number:
371B475FBA1FCEE5E533DC969A78DBE1

File PE Metadata
Compilation timestamp:
4/11/2015 12:06:18 AM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
8.0

.NET CLR dependent:
Yes

CTPH (ssdeep):
12288:1Miy4IadS4ms5I6e66fEheKhTsinLl9Sx5u3WmyE+qqcCLdgfrkC0u4LsyzqrpEo:1bSaE4mvt/uvl9Sx83jyENrDSLROrp

Entry address:
0x75F3E

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
464 KB (475,136 bytes)

The file iroot.exe has been seen being distributed by the following URL.

Remove iroot.exe - Powered by Reason Core Security