adobe_reader.exe

TRUsted apps ddd

This is the OutBrowse Revenyou installer which bundles offers for additional third party applications that may be unwanted and installed without consent. The application adobe_reader.exe by TRUsted apps ddd has been detected as adware by 28 anti-malware scanners. The program is a setup application that uses the OutBrowse Revenyou installer. The setup routine uses the RevenYou.Com Pay Per Install platform (OutBrowse) which bundles additional software offers inclduing toolbars, extensions, PC utilities as well as other PUPs.
Publisher:
TRUsted apps ddd  (signed and verified)

MD5:
af7f4f884f9a491de3e72ad589eadf53

SHA-1:
aa9ec18d845a93f19d4baec4e6aeeda85faddbbf

SHA-256:
d020912fceaa4cc3ae8bcdcacd45a496e1938e55e3836da1b7c79713e80f6f07

Scanner detections:
28 / 68

Status:
Adware

Explanation:
Bundles additional adware offers during download and installation using the OutBrowse installer.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
12/25/2024 1:14:34 AM UTC  (today)

Scan engine
Detection
Engine version

Lavasoft Ad-Aware
Dropped:Trojan.Generic.13105386
637

Agnitum Outpost
PUA.OutBrowse
7.1.1

AhnLab V3 Security
PUP/Win32.OutBrowse
2015.05.09

avast!
OutBrowse-IJ [PUP]
2014.9-150508

AVG
Adware Generic_s
2016.0.3115

Bitdefender
Dropped:Trojan.Generic.13105386
1.0.20.640

Bkav FE
W32.HfsAdware
1.3.0.6379

Dr.Web
Trojan.OutBrowse.354
9.0.1.0128

Emsisoft Anti-Malware
Dropped:Trojan.Generic.13105386
8.15.05.08.10

ESET NOD32
Win32/OutBrowse.BU potentially unwanted application
9.7.0.302.0

Fortinet FortiGate
Riskware/OutBrowse
5/8/2015

F-Prot
W32/OutBrowse.J (exact, not disinfectable)
v6.4.6.5.141

F-Secure
Dropped:Trojan.Generic.13105386
11.2015-08-05_6

G Data
Dropped:Trojan.Generic.13105386
15.5.25

IKARUS anti.virus
not-a-virus:AdWare.OutBrowse
t3scan.1.8.9.0

K7 AntiVirus
Unwanted-Program
13.203.15849

Kaspersky
not-a-virus:AdWare.Win32.OutBrowse
15.0.0.543

Malwarebytes
PUP.Optional.OutBrowse
v2015.05.08.10

McAfee
Program.Adware-OutBrowse.e
17.6.569.0

MicroWorld eScan
Dropped:Trojan.Generic.13105386
16.0.0.384

NANO AntiVirus
Trojan.Win32.Generic.dorbni
0.30.24.1357

nProtect
Trojan-Clicker/W32.OutBrowse.624776
15.05.08.01

Quick Heal
Adware.NSIS.OutBrowse.A
5.15.14.00

Reason Heuristics
PUP.Outbrowse.Bundler
15.5.8.22

Trend Micro House Call
TROJ_GE.04095BE4
7.2.128

Trend Micro
TROJ_GE.04095BE4
10.465.08

Vba32 AntiVirus
Adware.Outbrowse
3.12.26.3

VIPRE Antivirus
Threat.4823950
39486

File size:
610.1 KB (624,776 bytes)

File type:
Executable application (Win32 EXE)

Bundler/Installer:
OutBrowse Revenyou (using Nullsoft Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\adobe_reader.exe

Digital Signature
Authority:
thawte, Inc.

Valid from:
3/7/2015 6:00:00 PM

Valid to:
1/27/2016 5:59:59 PM

Subject:
CN=TRUsted apps ddd, O=TRUsted apps ddd, L=Dublin, S=Dublin, C=IE

Issuer:
CN=thawte SHA256 Code Signing CA, O="thawte, Inc.", C=US

Serial number:
27E0AF2AB7783845F34BA87F51FEF387

File PE Metadata
Compilation timestamp:
12/5/2009 4:50:52 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:17kBceEVdmy3E7tBVBSIphwWNhoD80hLZXIkrx2OGdBfhoPXGDt:17gzEay0HVfvwWNCD86NXZF2frfh

Entry address:
0x30FA

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 18, EC, 42, 00, E8, F1, 2B, 00, 00, A3, 64, EB, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 98, 8F, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 60, E3, 42, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 40, 43, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Entropy:
7.9479

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

Remove adobe_reader.exe - Powered by Reason Core Security