pdftoword.exe

Multiply ROI, Inc

This is the OutBrowse Revenyou installer which bundles offers for additional third party applications that may be unwanted and installed without consent. The application pdftoword.exe by Multiply ROI, Inc has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the OutBrowse Revenyou installer. The setup routine uses the RevenYou.Com Pay Per Install platform (OutBrowse) which bundles additional software offers inclduing toolbars, extensions, PC utilities as well as other PUPs.
Publisher:
pdftoword  (signed by Multiply ROI, Inc)

Product:
pdftoword

Version:
1.0

MD5:
e7993e2667aef9d214ab33d3bf716ea2

SHA-1:
f9eb003081fd8ab49dcf0710e41325ffb06853ea

SHA-256:
8e2e3bd119851fe139730da82c5568a480d5930ddbbfe5caaddcc849911d999e

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Bundles additional adware offers during download and installation using the OutBrowse installer.

Description:
This 'download manager' is also considered bundleware, a utility designed to download software (possibly legitimate or opensource) and bundle it with a number of optional offers including ad-supported utilities, toolbars, shopping comparison tools and browser extensions.

Analysis date:
6/17/2024 2:11:50 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.OutBrowse.MultiplyROI.Bundler (M)
16.3.5.12

File size:
587.2 KB (601,320 bytes)

Copyright:
© pdftoword

Trademarks:
pdftoword

File type:
Executable application (Win32 EXE)

Bundler/Installer:
OutBrowse Revenyou (using Nullsoft Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\pdftoword.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
2/27/2013 4:00:00 PM

Valid to:
2/26/2014 3:59:59 PM

Subject:
CN="Multiply ROI, Inc", OU=Digital ID Class 3 - Microsoft Software Validation v2, O="Multiply ROI, Inc", L=San Francisco, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
071EA95218ABA65B6DE651F0EFE6F136

File PE Metadata
Compilation timestamp:
12/5/2009 2:50:52 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:ELJ+zwVSigH1nydjBbwouc7SlSnCRfte/rf1mO9640yN3hmIOlaL5:EtYwsigVObSc7USCumOM40Wx6lq5

Entry address:
0x30FA

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 18, EC, 42, 00, E8, F1, 2B, 00, 00, A3, 64, EB, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 98, 8F, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 60, E3, 42, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 40, 43, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Entropy:
7.9768

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

The file pdftoword.exe has been seen being distributed by the following URL.

Remove pdftoword.exe - Powered by Reason Core Security