videoconvertersetup.exe

IronInstall

The application videoconvertersetup.exe by IronInstall has been detected as adware by 6 anti-malware scanners. It uses the InstallCore engine which may bundle additional software offers including toolbars and browser extensions. It is also typically executed from an Internet Explorer cache folder. The file has been seen being downloaded from spath2.path-tracker.com.
Publisher:
IronInstall  (signed and verified)

MD5:
43eeb75f4d479836d5361897a5658ed1

SHA-1:
353b37d06530489f58ffc810c585699516d161d0

SHA-256:
68d34bae2e8edd9706eea1e26ddd2063819089ebcd488d8145813a5cfef221bf

Scanner detections:
6 / 68

Status:
Adware

Explanation:
Uses the InstallCore download manager to install additional potentially unwanted software which may include extensions such as DealPly and various toolbars.

Analysis date:
2/26/2025 5:30:57 AM UTC  (today)

Scan engine
Detection
Engine version

avast!
Win32:Installer-I [PUP]
160518-2

Dr.Web
Adware.InstallCore.96
9.0.1.05190

ESET NOD32
Win32/InstallCore.AZ potentially unwanted application
8.0.319.0

F-Prot
W32/InstallCore.S.gen
4.6.5.141

Reason Heuristics
PUP.installCore.IronInst.Installer (M)
16.6.29.15

VIPRE Antivirus
Threat.4786018
50324

File size:
1.2 MB (1,262,296 bytes)

File type:
Executable application (Win32 EXE)

Common path:
C:\users\{user}\appdata\local\microsoft\windows\temporary internet files\content.ie5\{random}\videoconvertersetup.exe

Digital Signature
Signed by:

Authority:
COMODO CA Limited

Valid from:
11/20/2012 12:00:00 AM

Valid to:
11/20/2015 11:59:59 PM

Subject:
CN=IronInstall, O=IronInstall, STREET=63 Rothschild Blvd., L=Tel-Aviv, S=NA, PostalCode=65785, C=IL

Issuer:
CN=COMODO Code Signing CA 2, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB

Serial number:
2DC5BB8E9D823CD0C4F09AE859BBBEAC

File PE Metadata
Compilation timestamp:
6/19/1992 6:22:17 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.25

CTPH (ssdeep):
24576:6vtY5OO2bQDlPRLIpF42t1vG2Zq2C8jkJSI599y0:6glRLs4P2w2jjEy

Entry address:
0xD64D0

Entry point:
55, 8B, EC, 83, C4, F0, B8, AC, 06, 41, 00, E8, 04, F8, FF, FF, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
6.7839

Developed / compiled with:
Microsoft Visual C++

Code size:
869.5 KB (890,368 bytes)

The file videoconvertersetup.exe has been seen being distributed by the following URL.

Remove videoconvertersetup.exe - Powered by Reason Core Security