iroot.exe

yES APPs

This is the OutBrowse Revenyou installer which bundles offers for additional third party applications that may be unwanted and installed without consent. The application iroot.exe by yES APPs has been detected as adware by 6 anti-malware scanners. The program is a setup application that uses the OutBrowse Revenyou installer. According to AVG, this software downloads additional adware offers during setup. The file has been seen being downloaded from dl.downloaddesktop2.com.
Publisher:
UKLRG  (signed by yES APPs)

Product:
UKLRG

Version:
8284.15531.852.9643

MD5:
4fadff9fa32381fb8c0413a6485a3688

SHA-1:
c148637eb73dc13be46e0df05f25a45a23aba0cf

SHA-256:
61a3bd4be51d5d4bb713bcb4422e88d6b125e55e9875ce30e27704d023cdbb8a

Scanner detections:
6 / 68

Status:
Adware

Explanation:
Bundles additional adware offers during download and installation using the OutBrowse installer.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/25/2024 4:54:17 AM UTC  (today)

Scan engine
Detection
Engine version

AhnLab V3 Security
PUP/Win32.OutBrowse
2015.06.01

AVG
Downloader
2016.0.3092

ESET NOD32
Win32/OutBrowse.CE potentially unwanted application
7.0.302.0

K7 AntiVirus
Unwanted-Program
13.204.16089

Reason Heuristics
PUP.Outbrowse.Bundler
15.5.31.15

Trend Micro House Call
Suspici.9DDE4AEF
7.2.151

File size:
745.7 KB (763,616 bytes)

Product version:
8284.15531.852.9643

Copyright:
UKLRG

Trademarks:
UKLRG

File type:
Executable application (Win32 EXE)

Bundler/Installer:
OutBrowse Revenyou (using Nullsoft Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\iroot.exe

Digital Signature
Signed by:

Authority:
thawte, Inc.

Valid from:
5/27/2015 8:00:00 PM

Valid to:
12/17/2015 6:59:59 PM

Subject:
CN=yES APPs, O=yES APPs, L=Dublin, S=Dublin, C=IE

Issuer:
CN=thawte SHA256 Code Signing CA, O="thawte, Inc.", C=US

Serial number:
265DC0408CF3B52DFB1D83A636C6D864

File PE Metadata
Compilation timestamp:
12/5/2009 5:52:12 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:uMxXOCMULbm6hQbS822oiiI8JID6sjLqnBlhxssCUExCkYkBSmMCKCTrkRG4r/Ox:uMJOjUHm6hm9snhQTYkBTM7CERG4B86

Entry address:
0x30FA

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 18, 1C, 45, 00, E8, F1, 2B, 00, 00, A3, 64, 1B, 45, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 98, 37, 43, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 60, DB, 44, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, A0, 47, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Entropy:
7.9838

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

The file iroot.exe has been seen being distributed by the following URL.

Remove iroot.exe - Powered by Reason Core Security