minecraft.exe

Multiply ROI, Inc

This is the OutBrowse Revenyou installer which bundles offers for additional third party applications that may be unwanted and installed without consent. The application minecraft.exe by Multiply ROI, Inc has been detected as adware by 15 anti-malware scanners. The program is a setup application that uses the OutBrowse Revenyou installer. The setup routine uses the RevenYou.Com Pay Per Install platform (OutBrowse) which bundles additional software offers inclduing toolbars, extensions, PC utilities as well as other PUPs. With this installer, users are expecting to download Minecraft but before that occurs they may be presented with additional offers, mostly potentially unwanted software or adware.
Publisher:
MineCraft  (signed by Multiply ROI, Inc)

Product:
MineCraft

Version:
1.0

MD5:
794ef7c211e10aede25a084e8e523614

SHA-1:
a215c9e20581e066f715f7c2ed488237d67b1ccb

SHA-256:
097322889afc55afb916588f3bdd243103a715269a9324b8e1ef928693d0ff83

Scanner detections:
15 / 68

Status:
Adware

Explanation:
Bundles additional adware offers during download and installation using the OutBrowse installer.

Description:
This is also known as bundleware, or downloadware, which is an downloader designed to simply deliver ad-supported offers in the setup routine of an otherwise legitimate software.

Analysis date:
4/25/2024 1:21:20 AM UTC  (today)

Scan engine
Detection
Engine version

Agnitum Outpost
PUA.OutBrowse
7.1.1

Avira AntiVirus
APPL/Downloader.Gen
7.11.208.148

avast!
NSIS:OutBrowse-I [PUP]
2014.9-160115

Bkav FE
W32.Clod801.Trojan
1.3.0.4959

Clam AntiVirus
Win.Adware.OutBrowse-4
0.98/21411

Comodo Security
Application.Win32.OutBrowse.D
18064

Dr.Web
Adware.Downware.1449
9.0.1.015

ESET NOD32
Win32/OutBrowse.D potentially unwanted (variant)
10.11140

G Data
Win32.Application.OutBrowse
16.1.24

K7 AntiVirus
Unwanted-Program
13.193.14895

Malwarebytes
PUP.Optional.Smart
v2016.01.15.11

Qihoo 360 Security
Win32/Virus.Adware.a98
1.0.0.1015

Reason Heuristics
PUP.OutBrowse.MultiplyROI.Bundler (M)
16.1.15.11

Trend Micro House Call
Suspicious_GEN.F47V0816
7.2.15

VIPRE Antivirus
OutBrowse
37344

File size:
622.3 KB (637,240 bytes)

Copyright:
© MineCraft

Trademarks:
MineCraft

File type:
Executable application (Win32 EXE)

Bundler/Installer:
OutBrowse Revenyou (using Nullsoft Install System)

Language:
Language Neutral

Common path:
C:\users\{user}\downloads\minecraft.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
2/27/2013 4:00:00 PM

Valid to:
2/26/2014 3:59:59 PM

Subject:
CN="Multiply ROI, Inc", OU=Digital ID Class 3 - Microsoft Software Validation v2, O="Multiply ROI, Inc", L=San Francisco, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
071EA95218ABA65B6DE651F0EFE6F136

File PE Metadata
Compilation timestamp:
12/5/2009 2:50:52 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
6.0

CTPH (ssdeep):
12288:/zjvd/5V3Pz/3ovFUNkC9vg8kYFwn1Z0DqNPrVvpMVwJSBx03VzEfdC:/z7x3LQNUHvLUf3NPrViwowVz8C

Entry address:
0x30FA

Entry point:
81, EC, 80, 01, 00, 00, 53, 55, 56, 33, DB, 57, 89, 5C, 24, 18, C7, 44, 24, 10, 60, 91, 40, 00, 33, F6, C6, 44, 24, 14, 20, FF, 15, 30, 70, 40, 00, 68, 01, 80, 00, 00, FF, 15, B0, 70, 40, 00, 53, FF, 15, 7C, 72, 40, 00, 6A, 08, A3, 18, EC, 42, 00, E8, F1, 2B, 00, 00, A3, 64, EB, 42, 00, 53, 8D, 44, 24, 34, 68, 60, 01, 00, 00, 50, 53, 68, 98, 8F, 42, 00, FF, 15, 58, 71, 40, 00, 68, 54, 91, 40, 00, 68, 60, E3, 42, 00, E8, A4, 28, 00, 00, FF, 15, AC, 70, 40, 00, BF, 00, 40, 43, 00, 50, 57, E8, 92, 28, 00, 00...
 
[+]

Entropy:
7.9786

Packer / compiler:
Nullsoft install system v2.x

Code size:
23.5 KB (24,064 bytes)

Remove minecraft.exe - Powered by Reason Core Security