215 Apps - 16% Detection Rate *

Did you just find a download or a file on your computer that has been digitally signed by 215 Apps? Some of the security products refers to the detected files as GamePlayLabs (v) and Adware.GamePlayLabs. The detection rate for the 215 Apps files collected here is 16%. Please read on for more details.

You'll typically see 215 Apps when running the file. The publisher name is then displayed as the "Verified publisher" in the UAC dialog as the screenshot shows:

Screenshot where 215 Apps appears as the verified publisher in the UAC dialog

You can view additional details from the 215 Apps certificate with the following procedure:

  1. Open Windows Explorer and locate the 215 Apps file
  2. Right-click on the file and select Properties
  3. Click on the Digital Signatures tab
  4. Click on the View Certificate button

Here is a screengrab of a file digitally signed by 215 Apps:

Screenshot of the 215 Apps certificate

As you can see in the screenshot above, Windows states that "This digital signature is OK". This implies that the file has been published by 215 Apps and that the file has not been tampered with.

If you click the View Certificate button shown in the screenshot above, you can see all the details of the certificate, such as when it was issued, who issued the certificate, how long it is valid, and so on. You can also view the address for 215 Apps, such as the street name, city and country.

VeriSign Class 3 Code Signing 2010 CA has issued the 215 Apps certificates. You can also view the details of the issuer by clicking the View Certificate button shown in the screenshot above.

215 Apps Files

The following are the 215 Apps files I've collected, thanks to the FreeFixer users.

Detection RatioFile Name
8/47I Want This.dll
2/48RewardsArcade.dll
9/47I Want This.dll
23/48I Want This.dll
18/49I Want This.dll
13/45RewardsArcade.dll
18/44I Want This.dll
9/46I Want This.dll
20/48I Want This.dll
1/42I Want This.dll
6/42I Want This.dll
7/45I Want This.dll

Scanner and Detection Names

Here's the detection names for the 215 Apps files. I've grouped the detection names by each scanner engine. Thanks to VirusTotal for the scan results.

ScannerDetection Names
Ad-AwareGen:Variant.Adware.VidSaver.1, Application.GamePlayLabs.A
AntiVirAdware/Agent.494424.31, SPR/Tool.GamePlayLabs.A, Adware/Agent.494424.10, Adware/Agent.494424.40
Baidu-InternationalHackTool.Win32.CrossRider.gen, HackTool.Win32.CrossRider.A, Trojan.Win32.Toolbar.CrossRider, Trojan.Win32.Agent.Albb
BitDefenderGen:Variant.Adware.VidSaver.1, Application.GamePlayLabs.A
BkavW32.Clod78b.Trojan.b738, W32.Clod591.Trojan.8a1d
CAT-QuickHealAdware.Crossid (Not a Virus)
ComodoUnclassifiedMalware
DrWebAdware.GamePlayLabs.17, Adware.Bho.3849
ESET-NOD32a variant of Win32/Toolbar.CrossRider.A, Win32/Toolbar.CrossRider
EmsisoftGen:Variant.Adware.VidSaver.1 (B), Riskware.Win32.Toolbar.CrossRider.AMN (A)
F-SecureGen:Variant.Adware.VidSaver.1, Application.GamePlayLabs.A
GDataGen:Variant.Adware.VidSaver.1, Application.GamePlayLabs.A
IkarusWin32.SuspectCrc, Application.GamePlayLabs, AdWare.SuspectCRC
K7AntiVirusUnwanted-Program ( 00454f261 )
K7GWUnwanted-Program ( 00454f261 )
KingsoftWin32.Heur.KVMF58.hy.(kcloud), Win32.Troj.Generic.a.(kcloud)
MalwarebytesAdware.GamePlayLabs
McAfeeArtemis!B7BFFEE4EB20
McAfee-GW-EditionArtemis!B7BFFEE4EB20
MicroWorld-eScanGen:Variant.Adware.VidSaver.1, Application.GamePlayLabs.A
NOD32Win32/Toolbar.CrossRider
PCToolsAdware.Crossid!rem, Adware.Crossid
SophosAppRider
SymantecAdware.Crossid
TrendMicroADW_CROSSID, ADW_GAMEPLAYLABS, TROJ_GEN.R0CBC0OLC13, ADW_GAMEPLAB
TrendMicro-HouseCallADW_CROSSID, ADW_GAMEPLAYLABS, TROJ_GEN.R0CBC0OLC13, TROJ_GEN.R0CBH05JA13, TROJ_GEN.RCBH1DP, ADW_GAMEPLAB
VIPREGamePlayLabs (v)
ViRobotTrojan.Win32.A.Downloader.489472.BID

* How the Detection Percentage is Calculated

The detection percentage is based on that I've gathered 853 scan results for the 215 Apps files. 134 of these scan results came up with some sort of detection. If you like, you can view the full details of the scan reports by examining the files listed above.

Analysis Details

The analysis is based on certificates with the following serial numbers:

Comments

No comments posted yet.

Leave a reply