pconverter.253f8afa40044a018a20984433bf70cf.exe

PConverter

Mindspark Interactive Network

This is the installer stub for the Mindspark (Mindspark Interactive Network, Inc./Ask) browser toolbar which provides the offer to the end user to install the toolbar and set the browser's search, home page and new tab to an Ask.com search destination. The application pconverter.253f8afa40044a018a20984433bf70cf.exe by Mindspark Interactive Network has been detected as a potentially unwanted program by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the NSIS (Nullsoft Scriptable Install System) installer.
Publisher:
Mindspark Interactive Network, Inc.  (signed by Mindspark Interactive Network)

Product:
PConverter

Description:
PConverter Setup

Version:
2.7.1.1000

MD5:
15e94e3ac8a60f06ae1b1af51e8671f9

SHA-1:
e4f658578c1ddfa6804a9fbd579ae672e4d964f4

SHA-256:
4ab72975ac3a476522a0be9ba44d1195ea3a3c9bb2d5520d3e58023d1469d28a

Scanner detections:
1 / 68

Status:
Potentially unwanted

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
11/27/2024 4:34:58 AM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Mindspark (M)
17.2.9.9

File size:
365.5 KB (374,320 bytes)

Product version:
2.7.1.1000

Copyright:
© 2015 Mindspark Interactive Network, Inc. An IAC Company. All rights reserved.

Trademarks:
® & ™ Mindspark Interactive Network, Inc. An IAC Company. All rights reserved.

File type:
Executable application (Win32 EXE)

Installer:
NSIS (Nullsoft Scriptable Install System)

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\microsoft\windows\inetcache\ie\{random}\pconverter.253f8afa40044a018a20984433bf70cf.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
4/19/2015 7:00:00 PM

Valid to:
6/18/2018 6:59:59 PM

Subject:
CN=Mindspark Interactive Network, O=Mindspark Interactive Network, L=Yonkers, S=New York, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
438D4291E43C2DFFEEAAAEE5B6C070B5

File PE Metadata
Compilation timestamp:
12/24/2013 11:01:44 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

Entry address:
0x3229

Entry point:
81, EC, D4, 02, 00, 00, 53, 55, 56, 57, 6A, 20, 33, ED, 5E, 89, 6C, 24, 14, C7, 44, 24, 10, D8, A2, 40, 00, 89, 6C, 24, 1C, FF, 15, 34, 80, 40, 00, 68, 01, 80, 00, 00, FF, 15, 34, 81, 40, 00, 55, FF, 15, AC, 82, 40, 00, 6A, 08, A3, 58, 4F, 43, 00, E8, 9F, 2E, 00, 00, A3, A4, 4E, 43, 00, 55, 8D, 44, 24, 34, 68, B4, 02, 00, 00, 50, 55, 68, B8, B1, 42, 00, FF, 15, 7C, 81, 40, 00, 68, C0, A2, 40, 00, 68, A0, 3E, 43, 00, E8, 0A, 2B, 00, 00, FF, 15, 38, 81, 40, 00, BB, 00, F0, 43, 00, 50, 53, E8, F8, 2A, 00, 00...
 
[+]

Entropy:
7.9223

Packer / compiler:
Nullsoft install system v2.x

Code size:
24.5 KB (25,088 bytes)

The file pconverter.253f8afa40044a018a20984433bf70cf.exe has been seen being distributed by the following 5 URLs.

http://ak.imgfarm.com/images/nocache/vicinio/installers/v2/224203885.S19889.1/nsis/705166-S19889.1/170110121507354/.../PConverter.3772bbb4fee146589521d649b5dfcdbe.exe

http://ak.imgfarm.com/images/nocache/vicinio/installers/v2/224203885.S19889.1/nsis/705166-S19889.1/170110121507354/.../PConverter.88187300b6824adba2392882928a5ad0.exe

http://ak.imgfarm.com/images/nocache/vicinio/installers/v2/224203885.S19889.1/nsis/705166-S19889.1/170110121507354/.../PConverter.704dac21f6f84b1fb2f83ed5446ea112.exe

http://ak.imgfarm.com/images/nocache/vicinio/installers/v2/224203885.S19889.1/nsis/705166-S19889.1/170110121507354/.../PConverter.b98687c644f14d158c5b43d8a778e879.exe

http://ak.imgfarm.com/images/nocache/vicinio/installers/v2/224203885.S19889.1/nsis/705166-S19889.1/170110121507354/.../PConverter.253f8afa40044a018a20984433bf70cf.exe

The executing file has been seen to make the following network communications in live environments.

TCP (HTTP SSL):
Connects to 74.113.237.180.lv.iaccap.com  (74.113.237.180:443)

TCP (HTTP):
Connects to 74.113.233.192.df.iaccap.com  (74.113.233.192:80)

TCP (HTTP SSL):
Connects to 74.113.233.180.df.iaccap.com  (74.113.233.180:443)

TCP (HTTP SSL):
Connects to 74.113.235.138.dub.iaccap.com  (74.113.235.138:443)

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP):

TCP (HTTP SSL):
Connects to a23-217-197-120.deploy.static.akamaitechnologies.com  (23.217.197.120:443)

TCP (HTTP SSL):
Connects to a23-209-94-3.deploy.static.akamaitechnologies.com  (23.209.94.3:443)

TCP (HTTP SSL):
Connects to a23-207-48-200.deploy.static.akamaitechnologies.com  (23.207.48.200:443)

TCP (HTTP SSL):
Connects to a104-116-116-47.deploy.static.akamaitechnologies.com  (104.116.116.47:443)