rwcvnohosov.exe

Storm Alert

Rational Thought Solutions

This is part of an adware program designed to inject advertising in the web browser (banners, text-links) as well as modify the normal behavior of the browser as well as modify the computer’s system settings that control applications to run on startup. Part of the Injekt brand of unwanted programs. The application rwcvnohosov.exe, “StormAlert Service” by Rational Thought Solutions has been detected as adware by 1 anti-malware scanner with very strong indications that the file is a potential threat.
Publisher:
Rational Thought Solutions  (signed and verified)

Product:
Storm Alert

Description:
StormAlert Service

Version:
1.0.0.0

MD5:
979f4bd9883560d269cee81bca9f6897

SHA-1:
2bf7ec13da3298e18f1bb711918d160df0dd79ac

SHA-256:
1b69a0545e6177cbaa8e7c21bfccaeefc55b95db732794637bb9a01b6ae85e95

Scanner detections:
1 / 68

Status:
Adware

Explanation:
Injects display ads (banner ads), in-text ads, interstitial ads, or other types of ads in the web browser as well as alters the browsers settings (home page, search, DNS, and security protocols).

Analysis date:
4/19/2024 4:10:08 PM UTC  (today)

Scan engine
Detection
Engine version

Reason Heuristics
PUP.Injekt (M)
17.2.19.13

File size:
2.6 MB (2,726,776 bytes)

Product version:
1.0.0.0

Copyright:
Copyright © Rational Thought Solutions 2014

Original file name:
StormAlertService.exe

File type:
Executable application (Win32 EXE)

Language:
Language Neutral

Common path:
C:\ProgramData\wvubtwfpna\rwcvnohosov.exe

Digital Signature
Authority:
VeriSign, Inc.

Valid from:
3/16/2014 9:00:00 PM

Valid to:
3/17/2015 8:59:59 PM

Subject:
CN=Rational Thought Solutions, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Rational Thought Solutions, L=St. James, S=St. James, C=BB

Issuer:
CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US

Serial number:
14448451C4ACAC4A2AACA637288DB659

File PE Metadata
Compilation timestamp:
11/23/2014 10:37:54 PM

OS version:
4.0

OS bitness:
Win32

Subsystem:
Windows GUI

Linker version:
11.0

.NET CLR dependent:
Yes

Entry address:
0x2995BE

Entry point:
FF, 25, 00, 20, 40, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 02, 00, 10, 00, 00, 00, 20, 00, 00, 80, 18, 00, 00, 00, 38, 00, 00, 80, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 00, 01, 00, 01, 00, 00, 00, 50, 00, 00, 80, 00, 00, 00, 00, 00, 00...
 
[+]

Developed / compiled with:
Microsoft Visual C# / Basic .NET

Code size:
2.6 MB (2,717,184 bytes)

Remove rwcvnohosov.exe - Powered by Reason Core Security