Multiply ROI, Inc

Publisher Information

Multiply ROI, Inc is a software developer located in San Francisco, California in the United States*. The company is a primary distributor of unwanted software.
Remove Multiply ROI, Inc Malware - Powered by Reason Core Security
Authority:
VeriSign, Inc.

Valid from:
2/27/2013 7:00:00 PM

Valid to:
2/26/2014 6:59:59 PM

Subject:
CN="Multiply ROI, Inc", OU=Digital ID Class 3 - Microsoft Software Validation v2, O="Multiply ROI, Inc", L=San Francisco, S=California, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
071ea95218aba65b6de651f0efe6f136

Scanner detections:
Detections  (100% detected)

Scan engine
Details
Detections

Reason Heuristics
PUP.OutBrowse.MultiplyROI.Bundler (M), PUP.OutBrowse.MultiplyROI (M), PUP.Outbrowse.Bundler
100.00%

Malwarebytes
PUP.Optional.Smart, PUP.Optional.OutBrowse
14.00%

ESET NOD32
Win32/OutBrowse (variant), Win32/OutBrowse.D potentially unwanted (variant), Win32/OutBrowse.BA potentially unwanted (variant)
14.00%

Comodo Security
Application.Win32.OutBrowse.D, Application.Win32.OutBrowse.~AGT, UnclassifiedMalware
14.00%

VIPRE Antivirus
OutBrowse
14.00%

Avira AntiVirus
Adware/OutBrowse.M.1, APPL/Downloader.Gen, PUA/Outbrowse.Gen
14.00%

Kingsoft AntiVirus
Win32.Troj.Generic.a.(kcloud)
14.00%

Dr.Web
Adware.Downware.1449
14.00%

McAfee Web Gateway
Artemis!94146BB92788, BehavesLike.Win32.AdwareBetterSurf.hc, Artemis!9075F446ADD5, BehavesLike.Win32.AdwareBetterSurf.jc
14.00%

Trend Micro House Call
TROJ_GEN.F47V1001, Suspicious_GEN.F47V0816, TROJ_GEN.F47V0115, Suspici.E68ADD8E, TROJ_GEN.F47V0929, TROJ_GEN.F47V0922, TROJ_GEN.F47V1017
14.00%

1 / 68      (Adware)
ares.exe  (0f729a0ad9dffad573b3813b58c96697)

15 / 68    (Adware)
winrar.exe (Winrar)  (45a04d334a039d8cf26eaab2bed86494)

24 / 68    (Adware)
oovoo.exe (oovoo)  (84199ddb525a54bfc8fc630e947b7b31)

1 / 68      (Adware)
virtualdj.exe (VirtualDJ)  (dab72eca819418941c98a478e135f60f)

1 / 68      (Adware)
setup.exe  (ba2841b370a273c6045687ef3b0fc1ed)

1 / 68      (Adware)
setup.exe  (cf29e7de3d8355a02bef308825e6fef5)

1 / 68      (Adware)
wnb4ttig.exe (FrostWire)  (f5d48529ff9d3bbd9cc6790dc21bf7e3)

1 / 68      (Adware)
surgeonssimulator.exe (SurgeonsSimulator)  (24d1c6f4984381aafb11c2c60a370d95)

1 / 68      (Adware)
firefox.exe  (b44efa9fa5bb5f10302f62eeef506d66)

12 / 68    (Adware)
frostwire.exe (FrostWire)  (afcc35c1ee4fa0f4a5ef000cd7ba14a9)

1 / 68      (Adware)
installer.exe  (637a7a0b0ffc18cc091d7ac7e7789c6f)

1 / 68      (Adware)
happywheels.exe (HappyWheels)  (17f118d4bb1bae1aaf625a448a8aa0a3)

22 / 68    (Adware)
vlcplayer.exe (vlcplayer)  (d8a86e96d39202906b2e8ca2d92d698a)

1 / 68      (Adware)
tango.exe (Tango)  (f5a6f7c89f7099327f061ce0e6122016)

1 / 68      (Adware)
happywheels.exe (HappyWheels)  (3604d51bd7a244ddb4125726053fbbe9)

15 / 68    (Adware)

1 / 68      (Adware)
mediaplayer.exe  (0371749f31f8c6fca885761d9c36394b)

1 / 68      (Adware)
setup.exe  (5d3f17ba04c6e07f694b85496a4903fc)

1 / 68      (Adware)
firefox.exe  (7fff5611c9db60a498f681b983032716)

1 / 68      (Adware)
gimp.exe (Gimp)  (9809561774f5d261a309e80451d816e1)

1 / 68      (Adware)
slender.exe (slender)  (c710d049fdb686f6071e7595db48bbda)

1 / 68      (Adware)
slender.exe (slender)  (2a34ac1751913fa9f815ef9eca309c8e)

1 / 68      (Adware)
ares.exe (Ares)  (aedd2a33fd46729932d7eb4baa4edbd7)

19 / 68    (Adware)
minecraft.exe (MineCraft)  (794ef7c211e10aede25a084e8e523614)

1 / 68      (Adware)
setup.exe  (4dba3f8af0e707b2e1ce1daa9d3401ef)

1 / 68      (Adware)
setup.exe  (da2c71248e6448c0e33155395ad6ad62)

1 / 68      (Adware)
spidersolitaire.exe (Solitaire)  (cce08cb79e7c863cde96b0c32990abb3)

1 / 68      (Adware)
setup.exe  (bec19d8af5cc8db5ebae3cf1c98cf4b2)

1 / 68      (Adware)
setup.exe  (5b49b7a8f7234ab59c125d8515cab6ad)

1 / 68      (Adware)
setup.exe  (763d609138b43db593cd87165a87172c)

 
Latest 30 of 285 files

Downloads URLs for files signed by Multiply ROI, Inc.

15 / 68    (Adware)
http://cdn.ppdownload.com/MROI/.../Winrar.exe  (45a04d334a039d8cf26eaab2bed86494)

1 / 68      (Adware)
http://cdn.ppdownload.com/.../Tango.exe  (f5a6f7c89f7099327f061ce0e6122016)

1 / 68      (Adware)
http://cdn.ppdownload.com/.../HappyWheels.exe  (3604d51bd7a244ddb4125726053fbbe9)

1 / 68      (Adware)
http://cdn.ppdownload.com/.../ares.exe  (aedd2a33fd46729932d7eb4baa4edbd7)

1 / 68      (Adware)
http://cdn.ppdownload.com/.../Tango.exe  (0d68080f9c1abf2f7f965a34ac0bbd40)

The following websites host and distribute files published by Multiply ROI, Inc.

The following publishers (by Authenticode signature organization name) are related.

30 of 39 publishers

Remove Multiply ROI, Inc Malware - Powered by Reason Core Security
* Note, the details and description above are based on the code signing digital signature issued to Multiply ROI, Inc by VeriSign, Inc. on February 27, 2013 with the serial number '071ea95218aba65b6de651f0efe6f136'.