vz_ra_7315987558154668078.tmp

RewardsArcade

215 Apps

This is the installer application for a 50onRed advertising supported software package (displays ads in the browser and may hijack the home and search pages of the web browser). The file vz_ra_7315987558154668078.tmp, “RewardsArcade Installer” by 215 Apps has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat. The program is a setup application that uses the Nullsoft Install System installer. It is also typically executed from the user's temporary directory.
Publisher:
215 Apps  (signed and verified)

Product:
RewardsArcade

Description:
RewardsArcade Installer

Version:
1.0.11.61

MD5:
6b25a5b9ea1559acb6d0de8b7a488ec5

SHA-1:
1208799ac8787d91e538d27a737f8e65d4c08d10

SHA-256:
fb6fa905a8065e31782b360124c24525c965991038b9f1d623ef3f8273db2c40

Scanner detections:
1 / 68

Status:
Adware

Note:
Our current pool of anti-malware engines have not currently detected this file, however based on our own detection heuristics we feel that this file is unwanted.

Analysis date:
5/4/2024 11:28:10 PM UTC  (a few moments ago)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.50OnRed (M)
17.2.19.17

File size:
1.8 MB (1,907,656 bytes)

Copyright:
Copyright 215 Apps

Installer:
Nullsoft Install System

Language:
English (United States)

Common path:
C:\users\{user}\appdata\local\temp\vz_ra_7315987558154668078.tmp

Digital Signature
Signed by:

Authority:
VeriSign, Inc.

Valid from:
10/25/2011 2:00:00 AM

Valid to:
10/25/2012 1:59:59 AM

Subject:
CN=215 Apps, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=215 Apps, L=Philadelphia, S=Pennsylvania, C=US

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
4D064A782BC23A29CC9B8499A9F4AFB4

File PE Metadata
Compilation timestamp:
1/5/2010 1:09:27 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
2.56

Entry address:
0x3E13

Entry point:
55, 89, E5, 57, 56, 53, 81, EC, AC, 01, 00, 00, E8, 98, 52, 00, 00, C7, 04, 24, 01, 80, 00, 00, E8, 3C, 4F, 00, 00, 53, C7, 04, 24, 00, 00, 00, 00, E8, A7, 52, 00, 00, A3, 48, 5C, 42, 00, 51, C7, 04, 24, 08, 00, 00, 00, E8, 27, 32, 00, 00, A3, F8, 5C, 42, 00, 8D, 85, 84, FE, FF, FF, 52, C7, 44, 24, 10, 00, 00, 00, 00, C7, 44, 24, 0C, 60, 01, 00, 00, 89, 44, 24, 08, C7, 44, 24, 04, 00, 00, 00, 00, C7, 04, 24, 4C, B2, 40, 00, E8, D1, 51, 00, 00, 83, EC, 14, C7, 44, 24, 04, 4D, B2, 40, 00, C7, 04, 24, 28, 5D...
 
[+]

Code size:
32.5 KB (33,280 bytes)

Remove vz_ra_7315987558154668078.tmp - Powered by Reason Core Security