vroot.exe

File

STart noW

This is the OutBrowse Revenyou installer which bundles offers for additional third party applications that may be unwanted and installed without consent. The application vroot.exe by STart noW has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the OutBrowse Revenyou installer. The file has been seen being downloaded from get.0119c.info.
Publisher:
STart noW  (signed and verified)

Product:
File

Version:
1.9.3.0

MD5:
961377e4befbd805395edd042d66df98

SHA-1:
c6693bd5ecac58049e87bbce84567e7851c9bb04

SHA-256:
14a5acac087aacc33430bd3b16493ab91711d624373dc7bd7691dbf09c87dae4

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
11/26/2024 9:51:16 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Outbrowse (M)
16.12.11.9

File size:
1.1 MB (1,101,792 bytes)

Product version:
1.9.3.0

Copyright:
File

Original file name:
Ionic.Zip-2015May03-161501-a769c9b1-84b5-4c67-b36d-d1be72982928.exe

File type:
Executable application (Win32 EXE)

Bundler/Installer:
OutBrowse Revenyou

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\vroot.exe

Digital Signature
Signed by:

Authority:
thawte, Inc.

Valid from:
4/30/2015 7:00:00 AM

Valid to:
12/12/2015 6:59:59 AM

Subject:
CN=STart noW, O=STart noW, L=Dublin, S=Dublin, C=IE

Issuer:
CN=thawte SHA256 Code Signing CA, O="thawte, Inc.", C=US

Serial number:
15D4213A1350638DA9BE53171BCF40FB

File PE Metadata
Compilation timestamp:
5/3/2015 11:15:02 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows Console

Linker version:
8.0

.NET CLR dependent:
Yes

Entry address:
0x75F3E

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00...
 
[+]

Entropy:
7.5482

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
464 KB (475,136 bytes)

The file vroot.exe has been seen being distributed by the following URL.

http://get.0119c.info/.../1430669692/1430669692?26970698657ZV9rKjU5ZzUsLis2IFs2MTAtLSohZTsrLDE0LR1mNywfZGNjXm5bZF03cWttaWsfaV1mZjctH3hjZzYy

Remove vroot.exe - Powered by Reason Core Security